Security News > 2020

Facebook Sues Analytics Firm for Data Misuse
2020-02-28 04:56

Facebook on Thursday filed a federal lawsuit against oneAudience data intelligence firm over a tactic it used to gather information about users of social media platforms. New Jersey-based oneAudience paid software makers to install "Malicious" software in their apps in order to "Improperly" collect data about people at Facebook and other social media sites, Facebook said.

More than 40% of privacy compliance technology will rely on AI by 2023
2020-02-28 04:30

Over 40% of privacy compliance technology will rely on artificial intelligence by 2023, up from 5% today, according to Gartner. AI-powered privacy technology lessens compliance headaches.

Let's Encrypt Issued A Billion Free SSL Certificates in the Last 4 Years
2020-02-28 04:26

Let's Encrypt, a free, automated, and open certificate signing authority from the nonprofit Internet Security Research Group, has said it's issued a billion certificates since its launch in 2015. Since late last year, Let's Encrypt has issued at least 1.2 million certificates each day.

Acronis cyber protection solutions help orgs face any modern threat to their data
2020-02-28 04:00

Acronis, a global leader in cyber protection announced at RSA Conference 2020 several advances in the company's modern cyber protection approach. As a result, an organization's data, applications, and systems are prime targets for cyberattacks - and since modern cyberthreats target backup files and systems, data, applications and systems need to be protected by proven data protection solutions that also integrate cutting-edge security capabilities.

SentinelOne launches container and cloud-native workload protection offering
2020-02-28 03:30

SentinelOne, the autonomous cybersecurity platform company, announced the general availability of its next generation container and cloud-native workload protection offering. Purpose built for containers, SentinelOne's CWPP offering provides the richest set of capabilities on the market, including advanced runtime protection, full remote shell to any pod, container kill, and full remediation to empower security and DevOps teams - all seamlessly within SentinelOne's Singularity platform.

Gurucul unveils cloud-native Unified Security and Risk Analytics platform
2020-02-28 03:15

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced Gurucul Unified Security and Risk Analytics, the first cloud-native data science driven platform that unifies key Cyber Defense Center functions to enable contextual, risk-prioritized decisions for automating security controls. It applies security analytics to use cases handled by SIEM, UEBA, network traffic analysis, SOAR, cloud security and threat hunting in one consolidated platform to detect both known and unknown threats in real-time, identify risky user/entity behaviors, and automatically respond to security incidents.

Palo Alto Networks unveils Cortex XSOAR, a security orchestration, automation and response platform
2020-02-28 03:00

Palo Alto Networks, the global cybersecurity leader, introduced Cortex XSOAR, an extended security orchestration, automation and response platform that empowers security leaders with instant capabilities against threats across their entire enterprise. Palo Alto Networks is redefining the security orchestration, automation and response category by making threat intelligence management a core component.

SCYTHE Marketplace: Enabling corporate red teams to test the latest real world cyber threats
2020-02-28 02:30

SCYTHE, a leader in continuous adversarial emulation, is introducing the SCYTHE Marketplace at the RSA Conference 2020. The SCYTHE Marketplace opens up SCYTHE's synthetic malware creation platform to trusted third party developers so that they can turn their experience and expertise into new capabilities for a vibrant security ecosystem.

New LTE Network Flaw Could Let Attackers Impersonate 4G Mobile Users
2020-02-28 02:13

The impersonation attack - named "IMPersonation Attacks in 4G NeTworks" - exploits the mutual authentication method used by the mobile phone and the network's base station to verify their respective identities to manipulate data packets in transit. The man-in-the-middle attack allows a hacker to impersonate a user towards the network and vice versa.

(ISC)2 and NTT-AT partner to bring cybersecurity training to Japan
2020-02-28 02:00

2 - the world's largest nonprofit association of certified cybersecurity professionals - announced an expansion of its strategic partnership with NTT Advanced Technology Corporation, which will bring more local-language cybersecurity training to Japan. Now recognized as an Official Training Provider of2, NTT-AT offers public training on the official Certified Cloud Security Professional Common Body of Knowledge, helping to strengthen cloud security capabilities of organizations throughout Japan.