-
Feb08
Daily Security News from @trustpath - Feb 8, 2017
Daily Security news from @trustpath.
SailPoint Gives Enterprises The Power To Protect Against The Next Wave Of
ISBuzz News SailPoint’s new release gives organisations the power to protect against the next big wave of data breaches through intelligent and actionable … more.
TOP NEWS: Sophos Buys Malware Defence Firm Invincea As Billings Rise
“Invincea will strengthen Sophos’ leading next-gen endpoint protection with complementary predictive defenses that we believe will become … more.
SecureAuth Survey: 4 In 5 IT Decision Makers To Ditch Passwords Within Five
ISBuzz News SecureAuth Corporation, the leader in adaptive access control, today reveals that many organisations are waking up to the data breaches of 2016 and … more.
Is advanced threat hunting the best solution to cyber warfare and online
StartupSmart The best defence against information warfare and online crime has to include a little bit of offence, according to Malcolm Turnbull’s cyber security … more.
Verint Debuts in Gartner’s Market Guide for Endpoint Detection & Response
Detection & Response (EDR) in their December 2015 Market Guide. more.
Shoppers warned after PC Plus accounts breached
The company has declined several interview requests from CityNews on this issue but, in a written statement, drew attention to data breaches at other … more.
GDPR: Do not resist! Unless you want a visit from the data police
Here in the UK, the Information Commissioner’s Office has had a busy January issuing fines for data breaches. It fined IT Protect 40,000 for making … more.
Sophos Adds Advanced Machine Learning to Its Next-Generation Endpoint
Marketwired (press release) Invincea will strengthen Sophos’ leading next-gen endpoint protection with complementary predictive defenses that we believe will become … more.
Lastline Illuminates Advanced Malware Behaviors to Defeat Cyber Attacks
Lastline Enterprise also associates anomalous network traffic patterns with malware behavior, allowing for faster remediation of data breaches. more.
SecureAuth Sets New Bar for Secure Authentication with Phone Number Fraud
Marketwired (press release) “Organizations are deploying adaptive access control methods to prevent the misuse of stolen credentials, but attackers are evolving to take … more.
Sophos to Acquire Invincea to Add Industry Leading Machine Learning to its
The acquisition combines a Gartner Endpoint Protection MQ Leader (Sophos) with an MQ Visionary (Invincea) to form perhaps the most … more.
SureID Certified Edge Solution Transforms How Businesses Identity Proof
Business Wire (press release) A recent Ponemon Institute study examined the root cause of worldwide data breaches, and found that more than half of all breaches were caused by … more.
Lastline Illuminates Advanced Malware Behaviors to Defeat Cyber Attacks
Anomalous network behavior is often a precursor to data exfiltration, and detecting it enables security analysts to respond before suffering any data … more.
41 New Software Vulnerabilities Reported Every Day Throughout 2016
Given the mounting number of cyber attacks and data breaches, that number seems lower than it could have been. Unfortunately, this new report … more.
Sophos Acquires Invincea For $100M; Partners Cheer New Next-Gen Endpoint
CRN “For the Sophos partner, [the acquisition of Invincea] just provides that complete next-generation endpoint protection for them to go to market with. more.
Trend Micro Announces Deep Security 10 for Protecting Servers across the
IT Business Net Don’t assume end-user endpoint protection platform solutions are best-suited to protect cloud server workloads, which have vastly different protection … more.
Sophos Acquires Invincea for $120M Boosting Security Capabilities
Sophos aims to improve its synchronized security platform with the addition of Invincea’s advanced Endpoint Detection and Response capabilities. more.
Threat hunting gains in popularity to combat cyber threats
The use of threat hunting techniques to combat cyber attacks is increasing according to a new report. The study by Crowd Research Partners of … more.
When a Data Breach Happens, Will California Pay for Protection?
Between 2012 and 2015, the state Attorney General said it received reports of 657 data breaches that involved the personal information of more than … more.
Zoot Enterprises Partners With XOR Data Exchange To Offer Clients
PR Newswire (press release) … Identity Exchange, launched in May 2016, represents a major stride toward ending identity theft and fraud associated with data breaches. more.
Kaspersky Lab Named a Leader in Gartner’s Magic Quadrant for Endpoint
Kaspersky Lab Named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms for the Sixth Time in a Row. 08 Feb 2017. ShareThis. more.
Symantec Endpoint Protection + Secure Web Gateway
Security leaders can now leverage and optimise protection across networks and endpoints, providing a full spectrum of threat protection with fewer … more.
CRN Exclusive: Kudelski Security Says It Now Has The Ultimate Managed
CRN … brings together traditional security technologies with emerging startup offerings, in addition to breach detection and response capabilities, and more. more.
GTL Extends Data Encryption to Further Protect Customer Information
“Data breaches are on the rise, and the corrections industry has not been spared. In fact, a breach impacting one inmate telephone vendor is among … more.
After breaches, 2 providers take different routes with patients
Two more healthcare organizations have reported cyber attacks that resulted in unauthorized access to patient information, but the providers took … more.
Data firm alerts of open web being used to trade stolen credentials
One data feed firm has warned that stolen credentials are being sold on the open web. Despite this daylight trade of illicit goods, Webhose.io claims … more.
10 Ways Enterprises Can Limit Third-Party Cyber-Risk
What are the key steps enterprises of any size should take to reduce its risk from third-party data breaches, over which it has little or no control? more.
SureID’s Certified Edge Transforms Vendor Mgmt & ID (Learn More)
A recent Ponemon Institute study (2016: Cost of Data Breach Study: Global Analysis) examined the root cause of worldwide data breaches, and found … more.
ManageEngine Launches Log Analysis, Auditing Solution for Multi-Cloud
Business Wire (press release) Log management plays an integral role in an enterprise’s security strategy. However, logging in the public cloud is a challenge as access and controls … more.
Yahoo hit with data-breach class-action lawsuit claiming credit-card
SiliconBeat Neff’s suit accused Yahoo of negligently failing to take reasonable measures to protect users’ data, failing to prevent the data breaches, failing to notify … more.
-
Read these next:
- Daily IoT/Blockchain News from @surgethings - Feb 8, 2017
- Daily Cloud Computing News from @cloudfeednet - Feb 7, 2017