White Ops Acquired by Goldman Sachs

White Ops Acquired by Goldman Sachs

American cybersecurity company White Ops announced today that it has been acquired by Goldman Sachs‘ Merchant Banking Division in partnership with ClearSky Security and NightDragon.  Terms of the transaction, which follows Goldman Sachs’ and ClearSky’s initial investment in White Ops earlier this year, were not disclosed. The business was acquired from previous investors Paladin Capital Group, Grotech Ventures, and other shareholders. White Ops was founded in 2012 and is based in New York City. The company’s core focus is protecting enterprises from fraud and…

Read More

SolarWinds Hackers

SolarWinds Hackers

America’s Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning over the widespread impact of a recent hacking attack that compromised the SolarWinds Orion software supply chain. The assault on SolarWinds hit the headlines earlier this month after it was discovered and disclosed by researchers at FireEye. The advanced persistent threat (APT) group behind the attack was able to compromise government agencies, critical infrastructure, and private-sector organizations. Recognizing the serious nature of the attack, CISA put out…

Read More

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 1 – Docker Blog

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 1 – Docker Blog

2020 was some type of year…as we wrap up a year that undoubtedly will never be forgotten, we rounded up the most viewed Docker blog posts. The following posts are some of what you, the Docker community, found to be most interesting and useful. Which was your favorite? 10) Announcing the Compose Specification Starting the list with a *bang* is a post highlighting that we created a new open community to develop the Compose Specification….

Read More

Making the Journey to the Intelligent SOC – Cyber Defense Magazine

Making the Journey to the Intelligent SOC – Cyber Defense Magazine

AI, Machine Learning, and Open-XDR Make it Easier                                                                                   By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team of analysts evaluates and remediates cyberattacks. Traditionally, these SOCs use a dozen or more stand-alone security tools, each of which focuses on endpoints, the network, servers, users, applications, or other parts of the attack surface. This system results in hundreds or thousands of false-positive attack…

Read More

HelpSystems Acquires Vera to Expand Data Security Offerings

HelpSystems Acquires Vera to Expand Data Security Offerings

HelpSystems has announced the acquisition of cloud-based data protection provider Vera. The IT software firm said the deal will enable it to expand its data security portfolio and help meet a growing demand for solutions that can protect information throughout the full data lifecycle. This includes data classification, file transfer, data loss prevention and encryption. The need for improved data security has been driven by the shift to remote working in many organizations as a…

Read More

Why AI and security pros need to work together to fight cybercrime

Why AI and security pros need to work together to fight cybercrime

Cybercriminals sometimes use AI to their benefit. In order to defeat these cyber bad guys, security pros and AI should focus on what they do best. Image: Getty Images/iStockphoto Remember when all that was required for digital security was a good antivirus program? It seems like the distant past. Today’s complex cybersecurity offerings have moved way beyond those days, as cybercriminals are attacking on all fronts–infrastructure, applications, and computers. However, the underlying challenge has not…

Read More

Government Security Experts Issue Farmers with New Advice

Government Security Experts Issue Farmers with New Advice

The UK’s National Cyber Security Centre (NCSC) has issued its first ever guidance for farmers, in a sign of the growing cyber-threat facing rural businesses. Published on Tuesday, Cybersecurity for Farmers is a comprehensive guide to best practices covering everything from spotting suspicious emails and phone calls to password management, device security and the importance of backing up. The UK’s farms are increasingly run with the aid of technologies such as automated machinery, smart security…

Read More

Misconfigured AWS Bucket Exposes Hundreds of Social Influencers

Misconfigured AWS Bucket Exposes Hundreds of Social Influencers

A misconfigured cloud storage bucket has exposed the personal details of hundreds of social media influencers, potentially putting them at risk of fraud and harassment, according to researchers. A team at vpnMentor discovered the AWS S3 bucket wide open with no encryption or password protection, back in early November. Action has apparently yet to be taken by the company responsible, Barcelona-based “social commerce” company 21 Buttons. For a commission, influencers upload their photos to the…

Read More

New Lawsuit Takes Aim at Ring After Smart Doorbell Hijacking

New Lawsuit Takes Aim at Ring After Smart Doorbell Hijacking

Dozens of customers of a popular smart doorbell are suing the Amazon-owned manufacturer after their devices were hijacked, according to a new class action lawsuit. The new legal case joins together complaints filed by over 30 users in 15 families who say that their devices were hacked and used to harass them. They allege that the company has failed to update its security measures in the aftermath of these incidents and that it “blamed the…

Read More

Comprehensive study of law enforcement released by the Justice Department

Comprehensive study of law enforcement released by the Justice Department

Comprehensive study of law enforcement released by the Justice Department | 2020-12-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 3,316 3,317 3,318 3,319 3,320 3,468