Security News > 2020 > February

Cybersecurity software provider Alsid releases Alsid for Active Directory version 2.6, the latest iteration of its industry-leading Active Directory security solution. Alsid for AD is a cloud-based, agentless solution that monitors the security of any Active Directory infrastructure component in real time.

Zero trust is not a product or a destination, but rather a journey requiring organizations to practice good security hygiene, continuous monitoring and detection, as well as rapid incident response backed by high levels of automation, says Shehzad Merchant, chief technology officer of Gigamon. How the zero trust concept should be best defined and understood;.

GM is working with industry colleagues, company engineers, and middle school students to make cybersecurity a cornerstone of the auto industry, according to GM Chairman and CEO Mary Barra. Barra spoke at RSA 2020 on Thursday and explained the company's sophisticated strategy to improve cybersecurity now and in the future.

What role can technology now play in improving insider threat detection and response? Three CISOs share their insights. Joining ISMG's Tom Field to discuss insider threat are: Dawn Cappelli, vice president of global security and CISO of Rockwell Automation; Sujeet Bambawale, CISO of 7-Eleven; Solomon Adote, chief security officer of the state of Delaware; and Tony Pepper, CEO and co-founder of Egress Software Technologies.

Beginning with version 80.0.338.0, Microsoft Edge will include a new feature designed to block downloads that may contain PUAs, preventing those apps from reaching the user's computer. PUA blocking, Microsoft says, requires Microsoft Defender SmartScreen to be enabled.

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news.

Assembling strong data sets and developing domain expertise are more important than choosing an algorithm. Before selecting an algorithm to analyze data, companies have to know what they want to learn from the data.

The Federal Communications Commission Friday proposed fines against the nation's four largest wireless carriers for selling real-time mobile phone location data without taking reasonable measures to protect against unauthorized access to that information. In Friday statement, Paj said: "The FCC has long had clear rules on the books requiring all phone companies to protect their customers' personal information. And since 2007, these companies have been on notice that they must take reasonable precautions to safeguard this data and that the FCC will take strong enforcement action if they don't. Today, we do just that. This FCC will not tolerate phone companies putting Americans' privacy at risk."

The new feature, DKIM key management, is currently in beta and users have been encouraged to share feedback to help ProtonMail developers improve it. The signature is linked to the user's domain name and it's created with a private key that has a corresponding public key added to the domain registrar's DNS. If DKIM is used, the email recipient's server looks up the public key and uses it to verify the signature in the message's header to ensure that the email is legitimate.

A British judge on Thursday paused Julian Assange's extradition hearing following four days of intense legal wrangling over Washington's request for the WikiLeaks founder to stand trial there on espionage charges. The judge refused a request Thursday by Assange's lawyers to let him sit with his defence team, and not in the secure glass-walled dock area of the courtroom, when the hearing resumes.