Woodstock Wire: Enterprise Security News

February 25, 2018

GDPR Is Coming and Many Organizations Aren't Ready

Infosec -- CSO Online - Each year, ESG surveys around 700 cybersecurity and IT professionals as part of its annual IT spending intentions research (note:...

February 25, 2018 09:14 AM

Anatomy of an Attack on the Industrial IoT

Infosec -- Dark Reading - How cyber vulnerabilities on sensors can lead to production outage and financial loss.

February 25, 2018 09:14 AM

Colorado Department of Transportation Shut Down 2K Computers after Ransomware Attack

Infosec -- TripWire - The State of Security - Colorado's Department of Transportation (DOT) shut down more than 2,000 computers after its network suffered...

February 25, 2018 09:13 AM

Criminals sell counterfeit certificates to make malware look legitimate

Infosec -- CyberScoop - Enterprising cybercriminals are selling counterfeit digital certificates that allow hackers to disguise their malware as legitimate...

February 25, 2018 09:13 AM

Smart Contracts May Be Smart, But Are They Contracts?

Infosec -- TripWire - The State of Security - With distributed ledger technology (such as blockchain), there is growing interest in automating routine commercial...

February 25, 2018 09:13 AM

How to Secure Your Outlook Emails and Microsoft Accounts

Infosec -- TripWire - The State of Security - Living in today's society, it is almost impossible to meet someone without an email account. For almost everything...

February 25, 2018 09:12 AM

The Future of Threat Intelligence With Industry Veteran Errol Weiss

Infosec -- Recorded Future - The following interview was conducted at our recent annual user conference in Washington, D.C. Christopher Ahlberg, the CEO...

February 25, 2018 09:11 AM

How to build an incident response program: GDPR guidelines

Infosec -- Malwarebytes Unpacked - In today's computing world, it is not a matter of "if" an organization will get compromised, but "when." That's why,...

February 25, 2018 09:10 AM

How Developers got Password Security so Wrong

Infosec -- Cloudflare - Both in our real lives, and online, there are times where we need to authenticate ourselves - where we need to confirm we are who...

February 25, 2018 09:10 AM

Validating Leaked Passwords with k-Anonymity

Infosec -- Cloudflare - Today, v2 of Pwned Passwords was released as part of the Have I Been Pwned service offered by Troy Hunt. Containing over half a...

February 25, 2018 08:46 AM

7 Cryptominers & Cryptomining Botnets You Can't Ignore

Infosec -- Dark Reading - Cryptominers have emerged as a major threat to organizations worldwide. Here are seven you cannot afford to ignore.

February 25, 2018 08:46 AM

The Struggle to Operationalize Threat Intelligence

Infosec -- Recorded Future - Key Takeaways - Having heard of the benefits of incorporating threat intelligence into their security systems, many organizations...

February 25, 2018 08:45 AM

The Role of the CISO in Preventing Data Breaches

Infosec -- TripWire - The State of Security - In these times of unabated data breaches, the typical Chief Information Security Officer (CISO) must feel...

February 25, 2018 08:43 AM

Coldroot RAT cross-platform malware targets MacOS without being detected

Infosec -- Security Affairs - The former NSA hacker and malware researcher Patrick Wardle is back, this time he spotted a new remote access Trojan dubbed...

February 25, 2018 08:40 AM

Researchers Detail Linux-Based "Chaos" Backdoor

Infosec -- Infosec Island - A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit,...

February 25, 2018 08:38 AM

Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings

Infosec -- TripWire - The State of Security - Responding to the all too familiar news of compromised Amazon cloud storage, security researchers have begun...

February 25, 2018 08:31 AM

How to protect your network from PowerShell exploits

Infosec -- CSO Online - Hikers living off the land make use of existing nutrients and water sources to survive in the wilderness. In hacker parlance, the...

February 25, 2018 08:30 AM

SIM Hijacking - T-Mobile customers were victims an info disclosure exploit

Infosec -- Security Affairs - Lorenzo Franceschi-Bicchierai published an interesting post on SIM hijacking highlighted the risks for the end users and their...

February 25, 2018 08:29 AM

Private browsing gets more private

Life -- EurekAlert - A new MIT system uses JavaScript decryption algorithms embedded in web pages and code obfuscation to patch security holes left open...

February 25, 2018 08:06 AM

Don't Use SMS For Google's Two-Step Verification in Case Your Phone is Stolen

Life -- Lifehacker - Two-step verification is great. However, instead of using SMS for two-step verification, it's a good idea to use an Authenticator...

February 25, 2018 06:46 AM

Global study reveals cybersecurity professionals believe a catastrophic data breach to their organization is inevitable

Military -- A new global cybersecurity study commissioned by Raytheon (NYSE: RTN), in partnership with Ponemon Institute, reveals a majority of senior-level...

February 25, 2018 06:44 AM

Podcast: Anne Currie on Organizational Tech Ethics, including Scale, GDPR, Algorithmic Transparency

Enterprise -- InfoQ - Wes Reisz and Anne discuss issues such as the implications (and responsibilities) of the massive amount of scale we have at our fingertips...

February 25, 2018 06:39 AM

Palo Alto Networks introduces new hardware, firewall

Enterprise -- Computer Dealer News - California-based security company Palo Alto Networks rolled out updates to one of its operating systems and launched a...

February 25, 2018 06:36 AM

Terraform Provider for PAN-OS Now Available

Enterprise -- Palo Alto Networks Blog - The value of automation in the security world is well-understood. Eliminating manual tasks and automatically updating...

February 25, 2018 06:36 AM

Nasty, new security threats are scaring .govs to the cloud

Enterprise -- SiliconANGLE - The profusion of nasty, new cyber threats - nation state and sponsored state attacks, etc. - is lighting a fire under the seats...

February 25, 2018 06:07 AM

Article: Serverless Security: What's Left to Protect?

Enterprise -- InfoQ - This article aims to provide a broad understanding of security in the Serverless world. We'll consider the ways in which Serverless improves...

February 25, 2018 05:53 AM

Microsoft releases data protection tools to ensure compliance with EU's GDPR rules

Enterprise -- SiliconANGLE - With less than 90 days on the clock until the implementation of the European Union's General Data Protection Regulation, Microsoft...

February 25, 2018 05:24 AM

It's Back! Don't Panic, the Unit 42 Podcast, Returns with New Episodes

Enterprise -- Palo Alto Networks Blog - It's time to "Don't Panic" again!

Palo Alto Networks CSO Rick Howard and Palo Alto Networks Senior Director, Threat...

February 25, 2018 05:01 AM

How Much of Your Security Gear Is Misconfigured or Not Configured?

Think -- Gartner Blog Network - Now that we are truly done with SOAR, our Testing Security project continues in full force. This post is a bit contemplative,...

February 25, 2018 04:09 AM

February 23, 2018

OPAQ adds Palo Alto Networks as key partner on midmarket-focused security-as-a-service platform

Enterprise -- ChannelBuzz.ca - Palo Alto Networks next-gen firewall offerings are now available as a service on OPAQ's platform, in one of only two strategic...

February 23, 2018 07:55 PM

Palo Alto Networks Recognized for Assisted Technical Support Excellence by J.D. Power and TSIA for 3rd Consecutive Year

Enterprise -- Palo Alto Networks Blog - I'm very pleased to announce that J.D. Power and TSIA, the Technology Services Industry Association, have recognized...

February 23, 2018 07:46 PM

Our Security Orchestration and Automation (SOAR) Paper Publishes

Think -- Gartner Blog Network - It is with much excitement that we announce the publication of "Preparing Your Security Operations for Orchestration and...

February 23, 2018 07:07 PM

February 22, 2018

McAfee: Cybercrime now costs the global economy $600B

Enterprise -- SiliconANGLE - A new report from McAfee and the Center for Strategic and International Studies claims that cybercrime now costs the global economy...

February 22, 2018 08:19 PM

Threat hunting platform Vectra Networks lands $36M in late-stage funding

Enterprise -- SiliconANGLE - Cybersecurity firm Vectra Networks Inc. said today it has just raised $36 million in a late-stage round of funding. The company...

February 22, 2018 08:17 PM

Increasing number of email compromise scams target Fortune 500

Enterprise -- SiliconANGLE - Scammers in Nigeria are believed to be behind a significant increase in business email compromise attacks, according to a report...

February 22, 2018 08:17 PM

Oh, Bucket! AWS in S3 status-checking tool free-for-all

Enterprise -- The Register - 'Your data is waiting for the internet to download it' warning lights are now free

Amazon Web Services has signalled it's still...

February 22, 2018 08:14 PM

Trillions of botnet requests drive massive rise in malicious login attempts

Enterprise -- SiliconANGLE - Trillions of botnet requests have driven a massive increase in credential abuse, with more than 40 percent of login attempts found...

February 22, 2018 07:49 PM

Splunk Steps Up SIEM Investigation Capabilities Of Its Enterprise Security System

Enterprise -- CRN - New Investigation Workbench in Splunk Enterprise Security 5.0 accelerates threat incident analysis and response.

February 22, 2018 07:42 PM

Why Sheltered Harbor Should Be the New Standard for Cybersecurity

Enterprise -- MSPmentor - Your customers are under constant threat. Some major U.S. financial services organizations believe they have found a solution. Here's...

February 22, 2018 07:41 PM

February 21, 2018

Confidential data stolen from Tesla after staff failed to secure server with password

Enterprise -- SiliconANGLE - Elon Musk may be able to send a Tesla Inc. vehicle into space, but apparently his staff can't secure data online so easily. A...

February 21, 2018 06:14 PM

The "Black Mirror" scenarios that are leading some experts to call for more secrecy on AI

Think -- MIT Technology Review - Artificial intelligence could sway elections, help Big Brother, and make hackers way more dangerous, suggests a new report.

February 21, 2018 06:05 PM

Latest Intel Security News: Updated Firmware Available for 6th, 7th and 8th Generation Intel Core Processors, Intel Xeon Scalable Processors and More

Electronics -- Intel - By Navin Shenoy - Over the past several weeks, we've been developing and validating updated microcode solutions to protect Intel customers...

February 21, 2018 05:40 PM

February 20, 2018

The Top Ten Hardcore F5 Security Features in BIG-IP 13!

Enterprise -- F5 DevCentral - "Check it out," I told my son. "This building doesn't have a thirteenth floor." He didn't believe me until I pointed at the elevator...

February 20, 2018 07:14 PM

Year-old vuln turns Jenkins servers into Monero mining slaves

Enterprise -- The Register - The hip world of continuous integration meets the dark world of crypto-jacking

Here's a salutary reminder why it pays to patch...

February 20, 2018 07:07 PM

Google reveals Edge bug that Microsoft has had trouble fixing

Enterprise -- The Register - Oh great - because Google's explained how to make Edge run dodgy code

Google has again decided to disclose a flaw in Microsoft...

February 20, 2018 07:06 PM

Oracle Tuxedo "JOLTandBLEED" vulnerability (CVE-2017-10269)

Enterprise -- F5 DevCentral - In November 2017 Oracle published a vulnerability in the Jolt Server which is a component of Oracle Tuxedo. Just recently, a...

February 20, 2018 06:18 PM

GDPR: Are you ready for the new face of data privacy?

Enterprise -- CIO - The right to privacy is a long-standing concept that goes back to English Common Law. The Castle Doctrine gives us the familiar phrase,...

February 20, 2018 06:13 PM

February 19, 2018

Kenna Security's Chief Data Scientist Joins Forbes Technology Council

PR Newswire: High Tech Security -- Kenna Security, a leader in predictive cyber risk, announced today that Chief Data Scientist Michael Roytman has been named a member of the Forbes...

February 19, 2018 06:51 PM