Security News > 2020 > February

Acronis, a global leader in cyber protection announced at RSA Conference 2020 several advances in the company's modern cyber protection approach. As a result, an organization's data, applications, and systems are prime targets for cyberattacks - and since modern cyberthreats target backup files and systems, data, applications and systems need to be protected by proven data protection solutions that also integrate cutting-edge security capabilities.

SentinelOne, the autonomous cybersecurity platform company, announced the general availability of its next generation container and cloud-native workload protection offering. Purpose built for containers, SentinelOne's CWPP offering provides the richest set of capabilities on the market, including advanced runtime protection, full remote shell to any pod, container kill, and full remediation to empower security and DevOps teams - all seamlessly within SentinelOne's Singularity platform.

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced Gurucul Unified Security and Risk Analytics, the first cloud-native data science driven platform that unifies key Cyber Defense Center functions to enable contextual, risk-prioritized decisions for automating security controls. It applies security analytics to use cases handled by SIEM, UEBA, network traffic analysis, SOAR, cloud security and threat hunting in one consolidated platform to detect both known and unknown threats in real-time, identify risky user/entity behaviors, and automatically respond to security incidents.

Palo Alto Networks, the global cybersecurity leader, introduced Cortex XSOAR, an extended security orchestration, automation and response platform that empowers security leaders with instant capabilities against threats across their entire enterprise. Palo Alto Networks is redefining the security orchestration, automation and response category by making threat intelligence management a core component.

SCYTHE, a leader in continuous adversarial emulation, is introducing the SCYTHE Marketplace at the RSA Conference 2020. The SCYTHE Marketplace opens up SCYTHE's synthetic malware creation platform to trusted third party developers so that they can turn their experience and expertise into new capabilities for a vibrant security ecosystem.

The impersonation attack - named "IMPersonation Attacks in 4G NeTworks" - exploits the mutual authentication method used by the mobile phone and the network's base station to verify their respective identities to manipulate data packets in transit. The man-in-the-middle attack allows a hacker to impersonate a user towards the network and vice versa.

2 - the world's largest nonprofit association of certified cybersecurity professionals - announced an expansion of its strategic partnership with NTT Advanced Technology Corporation, which will bring more local-language cybersecurity training to Japan. Now recognized as an Official Training Provider of2, NTT-AT offers public training on the official Certified Cloud Security Professional Common Body of Knowledge, helping to strengthen cloud security capabilities of organizations throughout Japan.

CrowdStrike, a leader in cloud-delivered endpoint protection, announced at RSA Conference 2020 it is expanding the industry-leading visibility of the CrowdStrike Falcon platform, to protect workloads, across all environments, including workloads and containers running in the cloud and in private, public and hybrid data centers or on-premise. Falcon is extending the capabilities of its award-winning endpoint protection and endpoint detection and response to provide visibility specific to workloads hosted on Google Cloud Platform and Microsoft Azure and to provide EDR and run-time protection for containers.

Voice commands encoded in ultrasonic waves can, best case scenario, silently activate a phone's digital assistant, and order it to do stuff like read out text messages and make phone calls, we're told. In the video demo below, a handset placed on a table wakes up after the voice assistant is activated by inaudible ultrasonic waves.

Secureworks' new Cloud Configuration Review pairs its two decades of security operations and consulting experience with the innovative VMware Secure State, a public cloud security and compliance monitoring platform, to give customers an immediate head start against cloud security risks such as misconfiguration. Security recommendations: a consultative review of VMware Secure State findings to deliver a visual understanding of security risks, recommendations for remediation actions and guidance on how to prioritize security controls that have the most impact on cloud security posture.