Study Analyzes Challenges, Concerns for IT/OT Convergence

IT-OT convergence
A survey conducted by the Ponemon Institute on behalf of security solutions provider TUV Rheinland OpenSky analyzes the security, safety and privacy challenges and concerns related to the convergence between...
Continue reading
0 Comments

Site Isolation is Coming to Firefox

Mozilla is getting ready to boost the security of Firefox users with the addition of Site Isolation in the not too distant future.  Dubbed Project Fission, the initiative aims to...
Continue reading
0 Comments

Carbonite to Acquire Webroot for $618 Million in Cash

Cloud-based data backup provider Carbonite on Thursday announced plans to acquire cybersecurity company Webroot for roughly $618.5 million in cash.  Founded in 2005, Carbonite is know for its cloud-based backup...
Continue reading
0 Comments

Google Open Sources Fuzzing Platform

Google announced this week that it has open sourced ClusterFuzz, the fuzzing infrastructure it built to help finding memory corruption bugs in Chrome. The platform runs on over 25,000 cores...
Continue reading
0 Comments

NATO Opens Defense Innovation Challenge Seeking C4ISR Solutions

The NATO Communications and Information Agency (NCI) has opened its fourth annual Defense Innovation Challenge. It is open to start-ups, SMEs and academia; and invites proposals on solutions to support...
Continue reading
0 Comments

Huawei 'Shocked, Amused' by Espionage Accusations

Huawei's top executive in Europe brushed off Western critics and defended the company's track record against accusations that it could serve as front for Chinese spying. Huawei has raised suspicions...
Continue reading
0 Comments

Don't Search for a Needle in a Haystack: Use Cases for Threat Intelligence

Threat Intelligence Can be Used to Support Effective and Automated Incident Response Threat intelligence is an increasingly prominent element of security operations. In fact, back in 2017 Gartner predicted a...
Continue reading
0 Comments

Google Spots Attacks Exploiting iOS Zero-Day Flaws

Tweet from Google Project Zero researcher Tavis Ormandy
Zimperium's Adam Donenfeld warns of attacks exploiting Apple flaws
Google security researchers revealed that two of the vulnerabilities patched by Apple on Thursday with the release of iOS 12.1.4 were zero-day flaws exploited in the wild by malicious actors....
Continue reading
0 Comments

Apple Patches FaceTime Spying Vulnerability

Apple patches FaceTime vulnerability
Apple has finally released an iOS update that should fully patch the Group FaceTime vulnerability that could have been exploited to spy on users through their device’s microphone and camera....
Continue reading
0 Comments

20 Indicted in Multimillion-Dollar Online Fraud Scheme

Federal prosecutors have indicted 20 people in a multimillion-dollar international online fraud scheme. The case announced Thursday stems from a lengthy investigation out of Kentucky led by U.S. Secret Service...
Continue reading
0 Comments

Australia Wields Vast Decryption Powers Before Planned Review

Australian security agencies have begun using sweeping new powers to access encrypted communications, even before a promised review to address concerns from the likes of Google, Apple and Facebook. The...
Continue reading
0 Comments

Australian Parliament Computer Network Breached

Australia's parliament revealed Friday that its computer network had been compromised by an unspecified "security incident" and said an investigation was under way. "Following a security incident on the parliamentary...
Continue reading
0 Comments

Phishers Serve Fake Login Pages via Google Translate

A recent phishing attack targeting mobile users leveraged Google Translate to serve fake login pages to Google and Facebook users. The attack started with a basic notification sent to the...
Continue reading
0 Comments

Zero-day Vulnerability Highlights the Responsible Disclosure Dilemma

A zero-day vulnerability found in a video-conferencing system and responsibly disclosed led to the response, "Our developers are aware of some known vulnerabilities with the systems, development for these devices...
Continue reading
0 Comments

Micro-segmentation Security Firm Illumio Raises $65 Million

Illumio
Illumio, a company that specializes in securing data centers and cloud environments through micro-segmentation, on Thursday announced that it raised $65 million in a Series E funding round, which brings...
Continue reading
0 Comments

Critical Flaws Allow Hackers to Take Control of Kunbus Industrial Gateway

Vulnerabilities in Kunbus gateway
Several serious vulnerabilities have been identified in a gateway made by Kunbus, including flaws that can be exploited to take complete control of a device. Germany-based Kunbus offers connectivity solutions...
Continue reading
0 Comments

Fortinet Introduces New Next-Generation Firewalls

Fortinet this week announced new FortiGate Next-Generation Firewalls (NGFWs), which help customers improve security through implementing Intent-based Segmentation .  The newly announced firewalls, namely FortiGate 3600E, FortiGate 3400E, FortiGate 600E...
Continue reading
0 Comments

Six Steps to Segmentation in a Perimeterless World, Part 2

Network Segmentation is a Continuous Journey That Every Organization Should Take The amount of time that threat actors have to wreak havoc on an organization is on the rise. The...
Continue reading
0 Comments

Security Professionals Win When They Can Master Risk Communications

Demonstrating Effective Communication is a Foundation for Effective Security Operations A lot of people are talking about security risk right now. A quick Google search reveals articles on risks associated...
Continue reading
0 Comments

The Need for Intent-Based Network Segmentation

Segmenting Network for Security
Network Segmentation Needs to be Able to Consistently Secure and Isolate Data Regardless of Where it Needs to Go While networks continue to expand and evolve, the primary goals of...
Continue reading
0 Comments