October 27, 2022

LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks

LogRhythm announced its technology integration with Gigamon to help organizations around the globe increase visibility and protect against modern cyberattacks. By understanding the power and necessity of visibility, Gigamon and LogRhythm have integrated their solutions — the Gigamon Hawk Deep Observability Pipeline and LogRhythm SIEM Platform. The combined solution empowers security teams to identify behavioral …

LogRhythm integrates with Gigamon to help security teams detect anomalies across their networks Read More »

Bitdefender partners with Sharp to improve threat prevention in multifunction business printers

Bitdefender and Sharp Electronics announced a new partnership, enabling the integration of Bitdefender antimalware technology into Sharp’s new range of Future Workplace A3 multifunction printers (MFPs). The partnership strengthens cybersecurity threat prevention in Sharp’s new range of business MFPs available across Europe at a time when cybercriminals are increasingly targeting endpoint devices – including printers …

Bitdefender partners with Sharp to improve threat prevention in multifunction business printers Read More »

Sonatype and CyberRes expand collaboration to strengthen application security

Sonatype has expanded strategic partnership with CyberRes to provide organizations with a complete open source and application security solution. Building off of an eight-year partnership, the extended portfolio brings a security application through Sonatype’s complete Nexus Platform coupled to CyberRes’ Fortify Software Security Center (SSC). The on premise security solutions include the Sonatype Nexus Firewall, …

Sonatype and CyberRes expand collaboration to strengthen application security Read More »

Feds Urge Healthcare Entities to Train for Incident Response

Healthcare , HIPAA/HITECH , Incident & Breach Response Plans Should Emphasize Rehearsing Various Hacking, Breach Scenarios Marianne Kolbasuk McGee (HealthInfoSec) • October 27, 2022     Entities should document, test and practice incident response plans before they are faced with an actual event, regulators say. Speedy, practiced response is key to prevent, mitigate and recover …

Feds Urge Healthcare Entities to Train for Incident Response Read More »

Forescout CEO Wael Mohamed to Exit as Firm Lays off Workers

Endpoint Security , Internet of Things Security Mohamed’s Departure Means the IoT Scurity Firm Will Get Its 4th CEO Since Fall 2020 Michael Novinson (MichaelNovinson) • October 27, 2022     Outgoing Forescout CEO Wael Mohamed Internet of things security vendor Forescout will get its fourth chief executive since September 2020 while it lays off …

Forescout CEO Wael Mohamed to Exit as Firm Lays off Workers Read More »

The Anatomy of Wiper Malware, Part 3: Input/Output Controls

Originally published by CrowdStrike. Written by Ioan Iacob and Iulian Madalin Ionita, CrowdStrike. In Part 1 of this four-part blog series examining wiper malware, an Endpoint Protection Content Research Team introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data. In Part 2, the …

The Anatomy of Wiper Malware, Part 3: Input/Output Controls Read More »

1Kosmos and Ping Identity provide users with identity verification and passwordless solutions

1Kosmos has integrated with Ping Identity for the PingOne DaVinci no-code identity orchestration service. This partnership enables Ping Identity customers to implement identity-based authentication and passwordless access using 1Kosmos BlockID across all engagement channels with employees, customers and citizens. 1Kosmos joins a growing network of technology providers developing integrations with PingOne DaVinci through the Ping …

1Kosmos and Ping Identity provide users with identity verification and passwordless solutions Read More »

GitHub fixes critical vulnerability that exposed repositories to attackers

Checkmarx Supply Chain Security team has shared its findings on a new flaw discovered in GitHub that allows attackers to take control of repositories and infect codes and apps with malware. Researchers dubbed it a high-severity flaw in GitHub. Findings Details According to researchers, the attacker can use a technique called RepoJacking and control a …

GitHub fixes critical vulnerability that exposed repositories to attackers Read More »

Why Terminal Emulation is One of Your Business’s Most Critical Tools

By Milan Shetti, CEO Rocket Software According to PwC, almost two-thirds (60%) of Chief Information Officers (CIOs) see digital transformation as one of the most important drivers of growth this year. The cloud has been a major part of most organizations’ IT investments and digital transformation journeys. In fact, Gartner forecasts worldwide public cloud end-user …

Why Terminal Emulation is One of Your Business’s Most Critical Tools Read More »

Provenir collaborates with Sekura to secure customers through mobile intelligence and identity data services

Provenir has entered into a global partnership with Sekura Mobile Intelligence, a global provider of mobile data solutions. This partnership enables Provenir to provide customers access to trusted mobile data, direct from mobile operators through the Provenir Marketplace. Sekura provides real-time mobile identity data signals direct from global mobile operators, providing trusted, secure and easy …

Provenir collaborates with Sekura to secure customers through mobile intelligence and identity data services Read More »

A Practical Guide to Container Networking

Originally published by Tigera. Written by Reza Ramezanpour, Tigera. An important part of any Kubernetes cluster is the underlying containers. Containers are the workloads that your business relies on, what your customers engage with, and what shapes your networking infrastructure. Long story short, containers are arguably the soul of any containerized environment. One of the …

A Practical Guide to Container Networking Read More »

InfoSum and Experian join forces to deliver privacy-first collaboration solutions to customers

InfoSum and Experian initiative enables brands, partners, and media owners to leverage Experian’s identity graph to match their first-party datasets within InfoSum’s Secure Data Clean Room technology to enrich identity profiles and amplify match rates. The collaborative effort builds on InfoSum’s long-standing integration with Experian. The multi-party collaboration partnership will also build on both Experian’s …

InfoSum and Experian join forces to deliver privacy-first collaboration solutions to customers Read More »

Sharing Is Caring: How to Combat Cybersecurity

It’s hard for CEOs to manage the growing threat of cybersecurity across their businesses, especially considering more pressing company concerns. That’s why some forward-thinking business leaders are establishing frameworks for shared cybersecurity responsibility. In the article, Tamas Kadar, Founder and Chief Executive Officer at SEON, talks about the operational benefits of adopting this approach. Cybersecurity: …

Sharing Is Caring: How to Combat Cybersecurity Read More »

The art of cyber threat intelligence: How to identify & fight potential attackers

Dave is an experienced security engineer and business professional, leading Guardian Digital in providing businesses of all sizes with innovative cyber security services. Under Dave’s leadership, Guardian Digital helps companies stay ahead of emerging threats, make informed cyber security business decisions, reduce management complexity and free up IT resources. In the early days of the …

The art of cyber threat intelligence: How to identify & fight potential attackers Read More »

IAM and Security Automation: How Companies Can Stay Safer in the Cloud

Originally published by ShardSecure. Written by Anthony Whitehead, Lead Developer, Shardsecure. Automation of security measures is a long-running topic of discussion. But despite the many benefits, including increased productivity, effectiveness, efficiency, and accuracy, many organizations haven’t made the leap — or when they do, they run into challenges. No matter which area of security you …

IAM and Security Automation: How Companies Can Stay Safer in the Cloud Read More »

New York Post Hacked by Employee, Offensive Headlines Published

For as much as cybersecurity professionals talk about insider threats, you still never expect it to actually impact to your organization.  Earlier today, The New York Post announced it had been hacked by an employee who posted incredibly offensive headlines to its website and Twitter page. The Post immediately removed everything that was online, fired …

New York Post Hacked by Employee, Offensive Headlines Published Read More »

Versa Networks raises $120 million to accelerate SASE product innovations

Versa Networks secured additional financing of $120M in pre-IPO round led by BlackRock to capitalize on rapidly growing SASE market. Silicon Valley Bank (SVB) also participated in the funding. This new round of funding will enable Versa to expand go-to-market strategies and accelerate on its SASE innovations to further cement its leadership position in the …

Versa Networks raises $120 million to accelerate SASE product innovations Read More »

Critical Remote code execution flaw in Apache Linkis

Apache Linkis creates a compute middleware layer to unify task and engine governance and orchestration while enabling cross-engine context sharing. It also provides standardized interfaces (REST, JDBC, WebSocket, etc.) to connect to multiple  engines like Spark, Presto, Flink, etc. The JDBC EngineConn module has a flaw, which an attacker might use to deserialize and thereby get …

Critical Remote code execution flaw in Apache Linkis Read More »

FTC Takes Action Against Drizly and its CEO for Alleged Security Failures that Exposed Data of 2.5 Million Consumers

On October 24, 2022, the Federal Trade Commission announced a proposed consent order with Drizly, an online alcohol ordering and delivery service, and the company’s CEO, for the alleged failure to maintain appropriate security safeguards that led to a data breach that affected 2.5 million consumers’ personal information. In the FTC’s complaint, the agency alleged …

FTC Takes Action Against Drizly and its CEO for Alleged Security Failures that Exposed Data of 2.5 Million Consumers Read More »

Supersizing your DUO and 365 Integration, (Thu, Oct 27th)

As soon as defenders started implementing multifactor authentication, attackers tried to get around it. One of the most common methods attackers are currently using is Push or Call Annoyance. Attackers try multiple times to authenticate and annoy the user until they accept the request. Several options address this attack method. This article shows how to …

Supersizing your DUO and 365 Integration, (Thu, Oct 27th) Read More »

Biden now wants to toughen up chemical sector’s cybersecurity

The White House is adding the chemical sector to a program launched last year to improve cybersecurity capabilities within America’s critical infrastructure industries. The addition makes chemical facilities and manufacturers the fourth sector under the Biden Administration’s Industrial Control Systems (ICS) Cybersecurity Initiative, which rolled out in July 2021 following the ransomware attack on Colonial …

Biden now wants to toughen up chemical sector’s cybersecurity Read More »

Alice Palmer joins Neustar Security Services as CMO

Neustar Security Services announced that Alice Palmer has joined the company as chief marketing officer. Palmer will draw on more than twenty years of experience to lead the company’s global marketing strategy and marketing team, and to drive growth through accelerated demand generation, product and partner marketing and brand building. “Neustar Security Services is highly …

Alice Palmer joins Neustar Security Services as CMO Read More »

Code42 appoints Ananth Appathurai as SVP of Channel and Alliance Partners

Code42 announced that it has unified its channel, advisory and technology partner programs under the leadership of Ananth Appathurai, senior vice president of channel and alliance partners. This move unlocks the synergies between Code42’s advisory and technology ecosystem partners and its channel partners to make it easier to collaborate and deliver Insider Risk Management programs …

Code42 appoints Ananth Appathurai as SVP of Channel and Alliance Partners Read More »