2021 Predictions on Defeating Cybercriminals – Cyber Defense Magazine

2021 Predictions on Defeating Cybercriminals – Cyber Defense Magazine

by Gary S. Miliefsky, Publisher, Author, Investor and Keynote Speaker Here we are and most of us are thankful that 2020 is almost behind us, since the global panic has taken place as a result of the COVID-19 novel zoological corona virus bioweapon attack on humanity.  Are you also wondering where all the time went?  So much to do so little time.  Time is of the essence.  Time is the fire in which we burn. …

Read More

The software-defined home: IoT sensors can help build healthier and greener housing

The software-defined home: IoT sensors can help build healthier and greener housing

Creating an oasis of health in your home is getting easier with the help of sensors and IoT devices. Image: iStock/Techa Tungateja Business strategists at Moen, a kitchen and bathroom fixture supplier, recently identified trends that would influence future construction and home building. What they found was a theme of homes that promoted health, wellbeing and wellness.  SEE: TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download (TechRepublic Premium) To this end,…

Read More

Why cybersecurity tools fail when it comes to ambiguity

Why cybersecurity tools fail when it comes to ambiguity

Artificial intelligence will likely help with cybersecurity, though figuring out how to handle ambiguous situations is critical. Image: iStockphoto/metamororks There is a great deal of excitement about artificial intelligence (AI) and how, in the not-too-distant future, AI could have cognitive capabilities, allowing it to mimic how humans learn and make decisions. This ability is especially important in the realm of cybersecurity, where cyberattacks seldom present the same indicators twice. If we look at what’s available…

Read More

Hacker Earns $2m in Bug Bounties

Hacker Earns m in Bug Bounties

An ethical hacker from Romania has become the first person to earn $2m in bug bounties through the bounty hunting platform HackerOne. Talented hacker Cosmin Lordache, also known by his HackerOne handle @inhibitor181, hit his first significant earning milestone almost a year ago when he became the seventh person to pass the million-dollar earning milestone by reporting 468 flaws through the bug bounty hunting platform. Today, HackerOne announced on the social media platform Twitter that Lordache’s all-time earnings had reached…

Read More

White Ops Acquired by Goldman Sachs

White Ops Acquired by Goldman Sachs

American cybersecurity company White Ops announced today that it has been acquired by Goldman Sachs‘ Merchant Banking Division in partnership with ClearSky Security and NightDragon.  Terms of the transaction, which follows Goldman Sachs’ and ClearSky’s initial investment in White Ops earlier this year, were not disclosed. The business was acquired from previous investors Paladin Capital Group, Grotech Ventures, and other shareholders. White Ops was founded in 2012 and is based in New York City. The company’s core focus is protecting enterprises from fraud and…

Read More

SolarWinds Hackers

SolarWinds Hackers

America’s Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning over the widespread impact of a recent hacking attack that compromised the SolarWinds Orion software supply chain. The assault on SolarWinds hit the headlines earlier this month after it was discovered and disclosed by researchers at FireEye. The advanced persistent threat (APT) group behind the attack was able to compromise government agencies, critical infrastructure, and private-sector organizations. Recognizing the serious nature of the attack, CISA put out…

Read More

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 1 – Docker Blog

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 1 – Docker Blog

2020 was some type of year…as we wrap up a year that undoubtedly will never be forgotten, we rounded up the most viewed Docker blog posts. The following posts are some of what you, the Docker community, found to be most interesting and useful. Which was your favorite? 10) Announcing the Compose Specification Starting the list with a *bang* is a post highlighting that we created a new open community to develop the Compose Specification….

Read More

Making the Journey to the Intelligent SOC – Cyber Defense Magazine

Making the Journey to the Intelligent SOC – Cyber Defense Magazine

AI, Machine Learning, and Open-XDR Make it Easier                                                                                   By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team of analysts evaluates and remediates cyberattacks. Traditionally, these SOCs use a dozen or more stand-alone security tools, each of which focuses on endpoints, the network, servers, users, applications, or other parts of the attack surface. This system results in hundreds or thousands of false-positive attack…

Read More

HelpSystems Acquires Vera to Expand Data Security Offerings

HelpSystems Acquires Vera to Expand Data Security Offerings

HelpSystems has announced the acquisition of cloud-based data protection provider Vera. The IT software firm said the deal will enable it to expand its data security portfolio and help meet a growing demand for solutions that can protect information throughout the full data lifecycle. This includes data classification, file transfer, data loss prevention and encryption. The need for improved data security has been driven by the shift to remote working in many organizations as a…

Read More

Why AI and security pros need to work together to fight cybercrime

Why AI and security pros need to work together to fight cybercrime

Cybercriminals sometimes use AI to their benefit. In order to defeat these cyber bad guys, security pros and AI should focus on what they do best. Image: Getty Images/iStockphoto Remember when all that was required for digital security was a good antivirus program? It seems like the distant past. Today’s complex cybersecurity offerings have moved way beyond those days, as cybercriminals are attacking on all fronts–infrastructure, applications, and computers. However, the underlying challenge has not…

Read More
1 141 142 143 144 145 268