October 31, 2022

Socure and Carahsoft join forces to protect government agencies against identity fraud

Socure announced a new partnership with Carahsoft, providing Government agencies the opportunity to access Socure’s ID+ platform, an identity verification solution that goes beyond the industry standard to analyze every element of identity, maximize accuracy and inclusivity and protect against identity fraud. Carahsoft will serve as Socure’s Master Government Aggregator, making their leading platform available …

Socure and Carahsoft join forces to protect government agencies against identity fraud Read More »

GoSecure partners with Microsoft to enhance its MDR/XDR services

GoSecure announced a wider partner relationship with Microsoft, enabling GoSecure to add support for Microsoft’s security products and expand GoSecure’s growing ecosystem of MDR/XDR technology integrations. As the cybersecurity market continues trending toward automation and defense optimization, GoSecure is committed to accelerating this transition by partnering with leading technology providers, securing preferred access to best-of-breed …

GoSecure partners with Microsoft to enhance its MDR/XDR services Read More »

Converge collaborates with CyberCube to improve cyber resilience for businesses

Converge is partnering with CyberCube to provide customers with deeper data and risk solutions, delivering improved business outcomes at lower premiums. Integrating CyberCube’s platforms into Converge’s ecosystem will enhance the quality and depth of the analysis provided to clients across a spectrum of industries and sectors to confidently mitigate risk and strengthen cyber protection. CyberCube, …

Converge collaborates with CyberCube to improve cyber resilience for businesses Read More »

Main Targets of Ransomware Attacks & What They Look For

Cyber crime seems to evolve and innovate as much as the tech industry it seeks to exploit. In recent times, ransomware has become an especially potent tool of cyber criminals looking to exploit companies’ sensitive data for profit. Recent innovations in ransomware tactics include EDR bypass techniques, intermittent encryption and exfiltration tools that suggest that …

Main Targets of Ransomware Attacks & What They Look For Read More »

Announcing general availability of Elastic APM .NET agent profiler auto-instrumentation

A few months back, we introduced the beta release of Elastic APM .NET agent profiler auto-instrumentation. Fast forward to today, we’re excited to announce the general availability (GA) of this powerful capability that allows the .NET APM agent to automatically instrument .NET Framework, .NET Core, and .NET applications without requiring code changes or recompilation. In …

Announcing general availability of Elastic APM .NET agent profiler auto-instrumentation Read More »

Elastic Enterprise Search 8.5: Machine learning for intuitive search experiences

App Search support for Elasticsearch index-backed engines and hybrid ranking for vector similarity reach GA In 8.4, Elastic released public betas of App Search support for Elasticsearch-backed engines and hybrid ranking for vector similarity. With 8.5, these features have now reached general availability. Support for Elasticsearch index-backed engines introduces App Search’s relevance tuning, synonym management, …

Elastic Enterprise Search 8.5: Machine learning for intuitive search experiences Read More »

Elastic Security furthers unification of SIEM and on-host protection with XDR, cloud, and endpoint security

Why build cloud security as part of a native SIEM solution? Why not just keep them separate? Imagine you’re a security analyst investigating an alert from one of your cloud providers in your SIEM. The alert in question is related to a service running in a container whose network security groups have changed. Based on …

Elastic Security furthers unification of SIEM and on-host protection with XDR, cloud, and endpoint security Read More »

Elastic Stack & Cloud 8.5: AIOps, collaboration, vector search GA, and more

The issues covered on the Health page go beyond simple error reporting. They provide information on the impact and more detailed troubleshooting guidance. This simplifies cluster operations and makes it easy for anyone to identify and address the most critical issues, without requiring deep expertise in Elasticsearch. The Health page covers Elasticsearch issues today and …

Elastic Stack & Cloud 8.5: AIOps, collaboration, vector search GA, and more Read More »

Build robust search experiences, reduce time to observability, and streamline security workflows with Elastic 8.5

What’s new? Elastic Enterprise Search is the gold standard for implementing powerful, modern search and discovery experiences with Elasticsearch — enabling you to search everything, anywhere. With Elastic 8.5, Elastic Enterprise Search welcomes the general availability of advanced vector search functionality — including hybrid ranking — which combines vector similarity with query scoring. In addition, …

Build robust search experiences, reduce time to observability, and streamline security workflows with Elastic 8.5 Read More »

Managing your Kubernetes cluster with Elastic Observability

As an operations engineer (SRE, IT manager, DevOps), you’re always struggling with how to manage technology and data sprawl. Kubernetes is becoming increasingly pervasive and a majority of these deployments will be in Amazon Elastic Kubernetes Service (EKS), Google Kubernetes Engine (GKE), or Azure Kubernetes Service (AKS). Some of you may be on a single …

Managing your Kubernetes cluster with Elastic Observability Read More »

Overview of Content Published in October

Tuesday 1 November 2022 Overview of Content Published in October Here is an overview of content I published in October:Blog posts: YouTube videos: Videoblog posts: SANS ISC Diary entries: No comments yet. RSS feed for comments on this post. TrackBack URI This site uses Akismet to reduce spam. Learn how your comment data is processed.Read more

Absolute hires Samir Sherif as CISO and Jim Lejeal as CFO

Absolute Software appoints Jim Lejeal as Chief Financial Officer (CFO) and Samir Sherif as Chief Information Security Officer (CISO). Jim is a seven-time CFO and demonstrated financial strategist with a passion for helping software businesses scale. At Absolute, he will oversee all global finance, accounting, financial reporting, audit, tax, investor relations, and capital planning functions …

Absolute hires Samir Sherif as CISO and Jim Lejeal as CFO Read More »

Education tech giant gets an F for security after sensitive info on 40 million users stolen

Sloppy data security at education tech giant Chegg exposed students and workers’ personal information not once but four times in various ways over four years, according to the FTC.  In response, the American consumer watchdog today ordered the company to better protect data, including encrypting sensitive information, providing multi-factor authentication to users and employees, limiting …

Education tech giant gets an F for security after sensitive info on 40 million users stolen Read More »

With Cyber Threats on the Rise, Nero Consulting Encourages Businesses to Keep Their Guard Up

When Russia invaded Ukraine, CISA (Cybersecurity and Infrastructure Security Agency) issued warnings about the potential for malicious cyber attacks against the United States. The announcement only confirmed what Nero Consulting CEO, Anthony Oren, had already been yelling from his virtual megaphone for four years. In his 2018 CIOReview article, Nero Consulting: The Russians are Coming!, …

With Cyber Threats on the Rise,
Nero Consulting Encourages Businesses to Keep Their Guard Up
Read More »

Musk Dissolves Twitter Board Of Directors After $44B Buy

By Dave Simpson (October 31, 2022, 10:18 PM EDT) — Tesla Inc. CEO Elon Musk dissolved Twitter’s board of directors, leaving him as the sole director of the social media platform that he bought through a $44 billion deal last week, Twitter said in a U.S. Securities and Exchange Commission filing…. Read more

Hillary Clinton Wants Trump Sanctioned For Tossed RICO Suit

By Dorothy Atkins (October 31, 2022, 10:12 PM EDT) — Hillary Clinton and others targeted by Donald Trump in his recently dismissed racketeering lawsuit asked a Florida federal judge Monday to sanction the former president and his counsel and order them to pay their legal expenses, arguing that Trump and his attorneys “unreasonably and vexatiously …

Hillary Clinton Wants Trump Sanctioned For Tossed RICO Suit Read More »

Undisclosed OpenSSL vulnerability: Free scripts for target scoping

Tomorrow is “patch Tuesday” and it’s a notable one. The OpenSSL project team announced last week that they will be releasing OpenSSL version 3.0.7, with a patch to fix a critical security vulnerability. Until the vulnerability details are released, not much is known about the nature of the vulnerability. In 2014, Heartbleed was an extremely …

Undisclosed OpenSSL vulnerability: Free scripts for target scoping Read More »

The door is open for anyone to become a cyber defender

Throughout Cybersecurity Awareness Month, Microsoft has highlighted the importance of cybersecurity and provided resources to help people and organizations stay safe. It’s great to have this month as a reminder, and even better if that awareness becomes a year-round endeavor. Education is really the key. With the increase of sophisticated cyber attacks, we know that …

The door is open for anyone to become a cyber defender Read More »

CISA rolls out cross-sector cybersecurity performance goals for critical infrastructure, sets benchmark standards

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released voluntary and not comprehensive cross-sector cybersecurity performance goals (CPGs) to help establish a standard set of fundamental cybersecurity practices for the critical infrastructure sector. These benchmark goals will benefit small and medium-sized organizations as they kick-start their cybersecurity efforts. In addition, as they are measurable, organizations …

CISA rolls out cross-sector cybersecurity performance goals for critical infrastructure, sets benchmark standards Read More »