-
Jul25
Daily Security News from @trustpath - Jul 25, 2017
Daily Security news from @trustpath.
Global Physical Security Market Grows To USD ~120 Billion By 2022 At ~ 10%
Digital Journal … Locks, Video Surveillance, Physical Security Information Management, Security Scanning, Metal Detection, Fire & Life Safety and Segment Service … more.
Data Breaches Happening at Record Pace, Report Finds
The number of data breaches in the U.S. jumped 29 percent in the first half of this year, hitting a record high of 791, according to a new report from the … more.
US data breaches increased at record pace during first half of 2017
The number of data breaches in the United States tracked through June 30 hit a half-year record high of 791, according to recent numbers release by … more.
Survey: Does Your Cybersecurity Have Defense in Depth?
It helps to have good processes and a skilled staff in place, but strong cybersecurity technologies are the most important factor to avoid data breaches. more.
Kansas Database Hack Exposed 5.5 Million SSNs
The same factors that have resulted in thousands of previous data breachesforgotten databases, third-party vendor risks, inappropriate … more.
Contrast Labs: Software Libraries Represent Just Seven Percent of
PR Newswire (press release) Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise … more.
Cybersecurity skills shortage hurts security analytics, operations
This isn’t surprising, as threat hunting is an advanced skill set. That said, however, it is also a best practice within organizations that have established a … more.
Webroot Launches Worldwide Certification Program for SecureAnywhere
PR Newswire (press release) Under 2 hours in length, the technical track provides best practices for deploying and supporting SecureAnywhere Business Endpoint Protection. more.
Data Breaches in US Allegedly Increasing at Record Pace
The report predicted that at this pace, the total number of data breaches in 2017 may reach a new record of 1,500, which would be a 37 percent … more.
American workers are slaves to their emails: these digital organizers aim
MarketWatch And in an era of data breaches and email hacks, it’s never been more important to read and delete. Between work emails, personal correspondence … more.
Building and Securing the Workplace of the Future - @ThingsExpo #DX #IoT
SYS-CON Media (press release) The risks of shadow IT are tangible, and data breaches are potentially disastrous for enterprises. A lot of valuable data is still housed in legacy systems … more.
Data Breaches Hit Record High for First Half of Year
Data breaches are so common now that few of them make the news. But they’re happening faster than ever. In fact, the number of data beaches in the … more.
Fluency Expands Network Traffic Analysis Capabilities to Create the Most
PR Newswire (press release) … Log Management (CLM) capabilities to empower security operations centers to make far better decisions supported by automated implementation. more.
Cyber insurance, security work in tandem to limit risk
Today, 46 states have some form of statute requiring companies to publicly disclose data breaches. Some states allow companies to be fined and … more.
CounterTack Appoints Rajendra Dodhiawala Chief Product Officer To Expand
PR Newswire (press release) CounterTack uses behavioral analysis technology to power a robust portfolio of endpoint detection and response products. Through a single powerful … more.
Cyberbit embraces Singapore’s innovative edge to security
… a full-stack solution for industrial control networks; training and simulation platform Cyberbit Range; as well as endpoint detection and response. more.
27482 cyber security threat incidents in India till June 2017: CERT-In
Data breaches: Zomato said in May that it was affected by a data breach which led to details of 7.7 million users being stolen. The leaked information … more.
What the WPP cyber hack can teach the advertising sector and how it can
The Drum … turnover or 20m, whichever is larger, for serious data breaches, and it’s clear that now is the time for agencies to get their house fully in order. more.
emt Distribution and NinjaMSP team up for local opportunities
Scott Hagenus, emt CMO, says with integrations for third party patch management, Webroot endpoint protection and backup, MSPs can protect … more.
Employees are your biggest risk: Data hygiene needs to start at the top
In the last few years, there’s been a host of data breaches which have been the result of employee ignorance when it comes to security. There have … more.
Leaked Exploits Spark Major Cybercrime Incidents According to 2017 Mid-Year
PR Web (press release) For example, more than 200 organizations reported W-2 data breaches due to phishing messages in the first half of 2017 - a rise from the 175 reported … more.
With CNP Fraud, Vigilance Is Only Part Of The Battle
When data breaches occur, jobs are on the line from the CIO down to lower-level IT personnel. And the damage to trust and confidence on the part of … more.
Medical technology is advancing, but how secure is it?
When you consider that data breaches have cost the industry more than $6.2 billion, the cost of upgrading devices begins to look relatively low. more.
50% of US Retailers Certain They Are Targeted by Hackers: Survey
Various Blockchain-based projects including that of IBM could potentially combat cybersecurity threats, including data breaches as well as initiatives to … more.
Threat Hunting and Endpoints; A Dr. Stephenson tutorial
Our premise - and the way I do threat hunting - is that no single tool is enough and, while endpoint protection is critical, it does not give you the depth … more.
XL Catlin cyber policy for Asia Pacific
A report by Juniper Research reinforces this it is estimated that the cost of data breaches will reach $2.1 trillion globally by 2019, almost four times … more.
The Cybereason Intelligence Group Issues a Report Examining Destructive
PR Web (press release) Cybereason, the leading provider of behavioral-based enterprise attack protection, including including endpoint detection and response, … more.
AlphaBay and Hansa shutdown just the tip of the iceberg
… in the hope that data does not fall into the wrong hands in the first place although with high-profile data breaches making the headlines most days … more.
Fluency Expands Network Traffic Analysis Capabilities to Create the Most
Markets Insider … Analytics and Orchestration (SAO) solution version 5.5 that unites its innovative Network Traffic Analytics (NTA) and Central Log Management (CLM) … more.
Evolving Cyber Threats, Be Responsive To Defend
Integrate each device with log management (SIEM) tool and deploy correlation to notice and review them to action. - Regular internal and third party … more.
How to Exploit RAT Command and Control Toolkits Detailed at Black Hat
Symantec security researcher reveals that the tools behind some data breaches aren’t all that sophisticated and are vulnerable to attack. Symantec … more.
AI security startup JASK launches its new Trident platform
It also claims to reduce the risk of data breaches because security operations teams can accelerate the detection of malicious activities without … more.
The campaign against identity theft needs you
Educate employees about the role they play in protecting against data breaches and identity theft. Refer customers, clients, and employees who are … more.
AI-based platform improves security teams’ response
It ultimately reduces the risk of data breaches because security operations teams can accelerate the detection of malicious activities without the need … more.
3 Biggest Cyber Security Mistakes By Employees, How To Protect Against Them
The information that they gather does not have to be highly confidential in order to create successful attacks. Data breaches provide a distribution hub … more.
CrowdStrike Launches the Fastest and Largest Cybersecurity Search Engine
SUNNYVALE, Calif.–(BUSINESS WIRE)–CrowdStrike Inc., the leader in cloud-delivered endpoint protection, today announced that it has … more.
Threat Hunting and Endpoints; A Dr. Stephenson tutorial
I frequently get questions about my concept of threat hunting so in this blog I’ll take a look at that topic. We’ll return to the analysis of particular events … more.
AI security startup JASK launches its new Trident platform
… security operations, enabling security operations teams to defend networks with autonomous threat-hunting instead of staying in a reactive posture. more.
Gigamon Announces a New Defender Lifecycle Model
“Effective threat hunting and triage requires continuous visibility across the entire attack surface from cloud and data center workloads to user and IoT … more.
DarkLight Offers Artificial Intelligence to Enhance Cybersecurity Defenses
… DarkLight supports even the most advanced users looking to perform complex tasks like identifying lateral movement, threat hunting and monitoring … more.
Edison Partners Leads $8M Series A Growth Investment in Bricata
Bricata network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting … more.
-
Read these next:
- Daily IoT/Blockchain News from @surgethings - Jul 25, 2017
- Daily Cloud Computing News from @cloudfeednet - Jul 24, 2017