Security articles

The Marriott Data Breach: Indeed a Wake-up Call for Proactive Data Defense

The Marriott Data Breach: Indeed a Wake-up Call for Proactive Data Defense

There is something fundamentally wrong with customer data defense. Security and privacy tools that handle customer data are certainly in need of a makeover Last week, one of the biggest information heists in history came to light. Global hospitality major Marriott International apologetically admitted that hackers had broken into personal data of nearly half-a-billion of

Dell Announces Potential Cybersecurity Incident

Dell is announcing that on November 9, 2018, it detected and disrupted unauthorized activity on its network attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords. Though it is possible some of this information was removed from Dell’s network, our investigations found no conclusive evidence that any was

Sophos Adds Lateral Movement Protection to XG Firewall

Sophos XG Firewall now includes lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised network. With the SamSam ransomware campaign estimated to have earned more than $6.5 million, it is not surprising that criminals are attracted to this method. In these attacks, cybercriminals target weak entry points and

IBM QRadar Advisor with Watson Expands Knowledge of Cybercriminal Techniques

New Algorithms Learn from Security Response Patterns within an Organization; Platform Now Leverages Open-Source MITRE ATT&CK Framework IBM Security today announced new capabilities for the company’s AI-based security platform, QRadar Advisor with Watson, which expand the platform’s knowledge of cybercriminal behavior and allow it to learn from security response activities within an organization. IBM Security

Cisco Announces Intent to Acquire Duo Security

Acquisition will help accelerate Cisco’s intent-based networking strategy, allowing customers to securely connect users to any application on any Network. Photo: From left to right – Duo Security co-founder and CEO Dug Song; Cisco security business SVP Gee Rittenhouse; and Duo Security co-founder and CTO Jon Oberheide. Cisco to acquire privately-held Duo Security, headquartered in

Check Point Introduces Generation V Security Gateway for Enterprises and Data Centers

New Check Point all-inclusive 23900 appliance delivers maximum protection against fifth-generation cyber threats with unprecedented performance Check Point Software Technologies Ltd announced the launch of its new 23900 security gateway, setting a new standard of protection against the most advanced fifth-generation of cyber attacks targeting enterprise and data center networks. Combining comprehensive threat prevention with

SonicWall Expands Cybersecurity Portfolio with Capture Cloud Platform and Virtual Capabilities

SonicWall has recently introduced the SonicWall Capture Cloud Platform, which tightly integrates security, management, analytics and real-time threat intelligence across the company’s full portfolio of network, email, mobile and cloud security products. SonicWall also is introducing new and enhanced products in its portfolio of hardware, virtual appliances and endpoint clients. The significance of the unified

Palo Alto Networks Intents to Acquire Secdo

Palo Alto Networks today announced that it has entered into a definitive agreement to acquire Israel-based Secdo. The acquisition brings sophisticated endpoint detection and response, or EDR, capabilities – including unique data collection and visualization – to Palo Alto Networks Traps advanced endpoint protection and the Application Framework in order to enhance their ability to

Sonicwall

SonicWall bags the Most Promising Cybersecurity Vendor of Year award

At the Infosec Maestros Awards 2018 concluded earlier this month in Mumbai, SonicWall was presented with the InfoSecurity Live Editor’s Choice Award for the Most Promising Cybersecurity Vendor of the Year, 2017–18. More than 200 CISOs and CIOs across industry sectors and cities in India were surveyed to determine the Most Promising Cybersecurity Vendor. The

Criminals Conceal Miners Under the Guise of Legitimate Thematic Apps: Kaspersky

Kaspersky Lab’s researchers have discovered that more and more cyber criminals are turning their attention to malicious software that is mining cryptocurrencies at the expense of users’ mobile devices. These criminals are getting greedier and now use not only malware, but also risk tools, hiding mining capacities in popular football and VPN applications to profit

Top