November 7, 2022
Via: Help Net SecurityIdentity.com launched version-two of its next-generation Gateway Protocol to enable users at individual and enterprise levels to have far more control over sensitive personal identity information that is vulnerable to hacks and abuse by a wide range of actors. Founded […]
November 21, 2019
Via: Help Net SecurityIBM announced Cloud Pak for Security, featuring industry-first innovations to connect with any security tool, cloud or on-premise system, without moving data from its original source. The platform includes open-source technology for hunting threats, automation capabilities to help speed response […]
Access control, Network security, Security
November 8, 2019
Via: Dark ReadingGood passwords are messy. They’re long, chaotic, and very difficult to memorize. That’s what makes them so strong. To keep them good and useful, though, requires a tool — a password manager. The idea at the core of most password […]
November 6, 2019
Via: Help Net Security86% of enterprises have deployed cloud-based tools, but only 34% have implemented single sign-on (SSO), one of the most basic and critically important cloud security tools, according to Bitglass. The report found that the use of cloud applications has grown […]
September 22, 2019
Via: Kelly RedmondThe way we work has changed. As of 2019, the number of companies allowing remote work has increased up to 66%, with 16% of them being fully remote—according to recent research. Because this is a growing trend, one that can yield […]
August 21, 2019
Via: Security WeekFacebook, under pressure to ramp up privacy rules across its platform, said on Tuesday it was rolling out a tool allowing users to control data that it receives from other apps and websites about their online activity. The new tool […]
Mobile, Network security, Privacy protection
July 15, 2019
Via: Hot for SecurityTerrorist organizations know their way around the web, and they don’t shy away from using social networks to communicate with each other or to recruit new members. The FBI is looking into gaining more control over social media and the […]
July 10, 2019
Via: Threat PostIntel has patched a high-severity vulnerability in its processor diagnostic tool, which could allow local attackers to launch several malicious attacks on affected devices, such as escalation of privilege or denial of service. The Intel Processor Diagnostic tool is a […]
April 26, 2019
Via: Security IntelligenceEffective threat management requires security teams to combine security analytics with the abundance of machine-generated data that is prevalent in most enterprise environments. Tools such as network traffic analysis, endpoint detection, security information and event management (SIEM), and user behavior […]
April 18, 2019
Via: Help Net SecurityEndpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the probability of failure and decay, in turn, exposing […]
March 20, 2019
Via: Threat PostGhidra, a free, open-source software reverse-engineering tool that was released by the National Security Agency at RSA, has been found to be a potential conduit to remote code-execution. Ghidra is a disassembler written in Java; software that breaks down executable […]
February 27, 2019
Via: CSO OnlineSecurity researchers have recently found flaws in several popular password managers that can allow attackers with access to a computer to retrieve passwords from its memory. While the vulnerabilities are real, protecting secrets in memory is an ongoing issue for […]
Malware, Threats & Malware, Virus & Malware
February 20, 2019
Via: Help Net SecurityA new decryption tool has been released for free on the No More Ransom depository for the latest strand of GandCrab. This tool was developed by the Romanian Police in close collaboration with the internet security company Bitdefender and Europol, […]
January 31, 2019
Via: Help Net SecurityMicrosoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new Microsoft 365 security center allows security administrators and other risk management professionals to manage and […]
November 20, 2018
Via: The HillA cybersecurity group has released a new tool to help companies track if they’ve implemented domain-based message authentication, reporting and conformance (DMARC), a security tool aimed at preventing fake or “spoof” emails being sent from legitimate accounts. The Global Cyber […]
September 27, 2018
Via: Dark ReadingVPNFilter malware is adding capabilities to become a more fully-featured tool for threat actors. Malware writers are finding greater efficiencies by reusing older code families. That explains why VPNFilter — the attack that caused the FBI to recommend that everyone […]
September 10, 2018
Via: Naked SecurityApple is planning to create an online portal that will allow law enforcement officials around the world to request information about its users more easily. The company is seeking to streamline the way that it currently services information to government […]
August 9, 2018
Via: Dark ReadingBLACK HAT USA – Las Vegas – A team of ICS experts who spent the past year studying and re-creating the so-called TRITON/TRISIS malware that targeted a Schneider Electric safety instrumented system (SIS) at an oil and gas petrochemical plant […]
June 5, 2018
Via: Security IntelligenceA security truism: There will always be things we want to do, but we just can’t get the budget for them. Some strategies can be harder in this regard than others, including those that are technically sophisticated, less mainstream or […]
May 17, 2018
Via: Security IntelligenceThe cybersecurity industry today remains fragmented, with some organizations having as many as 85 security tools from 45 different vendors. Many of these technologies have been acquired over multiple years to address specific challenges across the complex threat landscape. Each […]