Security News > 2020

IoT cybersecurity’s worst kept secret
2020-01-17 06:30

Although making better sense of and use of data may be standard fare in other areas of the enterprise, who knew that modern IoT cybersecurity solutions would become network security's newest professional lever? Actually, we should have seen it coming, because digital transformation always starts with visibility and that's exactly what market-leading IoT cybersecurity solutions are delivering. Modern IoT cybersecurity solutions are founded on visibility.

New infosec products of the week: January 17, 2020
2020-01-17 06:00

STEALTHbits StealthINTERCEPT 7.0 strengthens enterprise passwords and AD security. The latest enhancements delivered in StealthINTERCEPT 7.0 aim to provide organizations advanced capabilities to thwart attacks against AD and provide progressive password policy and complexity improvements that boost security without causing poor user and administrator experiences.

How to govern cybersecurity risk at the board level
2020-01-17 05:30

A report from University of California, Berkeley's Center for Long-Term Cybersecurity and Booz Allen Hamilton uses insights gleaned from board members with over 130 years of board service across nine industry sectors to offer guidance for boards of directors in managing cybersecurity within large global companies. Board members largely agree they are just getting started with oversight of cybersecurity and believe the cyber risk environment is not stabilizing or likely to do so in a predictable way over the next few years.

Worldwide IT spending to total $3.9 trillion in 2020
2020-01-17 05:00

Worldwide IT spending is projected to total $3.9 trillion in 2020, an increase of 3.4% from 2019, according to the latest forecast by Gartner. Global IT spending is expected to cross into $4 trillion territory next year.

SecureLink simplifies vendors privileged access management for healthcare organizations
2020-01-17 04:15

SecureLink, the leader in vendor privileged access management, released SecureLink for Healthcare to provide hospitals and healthcare organizations a centralized solution for managing privileged access for third-party vendors. It is customized to meet the needs of organizations operating under HIPAA and HITECH regulations and gives network administrators the ability to limit access to specific systems and applications, while providing a full video audit and keystroke logging of sessions.

Cloudflare for Campaigns protects political campaigns against cyberattacks and election interference
2020-01-17 04:00

Cloudflare, the security, performance, and reliability company helping to build a better Internet, announced it will be offering free security services to help political campaigns in the United States and around the world defend against cyberattacks and election interference. Separate from these projects, Cloudflare provided services to 16 of the 17 2016 U.S. Presidential campaigns and has provided service to 18 of the 32 2020 U.S. Presidential campaigns.

DataVisor dEdge: Uncover known and unknown attacks early
2020-01-17 03:30

DataVisor announced the availability of dEdge, an anti-fraud solution that detects malicious devices in real-time, empowering organizations to uncover known and unknown attacks early, and take action with confidence. DataVisor's dEdge is built to protect connected devices.

CloudNine Collection Manager: Data extraction solution for Office 365 emails and OneDrive files
2020-01-17 03:00

CloudNine launches CloudNine Collection Manager, a breakthrough data extraction solution from the global electronic discovery technology provider. Installed in minutes, Collection Manager defensibly performs native data collections from Office 365 email custodians, as well as Microsoft OneDrive cloud storage files.

Micro Focus AD Bridge 2.0: Extending security policies and access controls to cloud-based Linux
2020-01-17 02:30

Micro Focus released Micro Focus AD Bridge 2.0, offering IT administrators the ability to extend Active Directory controls from on-premises resources, including Windows and Linux devices to the cloud - a solution not previously offered in the marketplace. With AD Bridge 2.0, organizations can leverage existing infrastructure authentication, security as well as policy, in order to simplify the migration of on-premises Linux Active Directory to the cloud, resulting in fully secured and managed Linux virtual machines in the cloud.

52 hackers participate in ninth U.S. Department of Defense and HackerOne bug bounty program
2020-01-17 02:00

Through partnership with the Defense Digital Service, the U.S. Department of Defense and HackerOne, the number one hacker-powered pentesting and bug bounty platform, announced the results of the second Army bug bounty program, 'Hack the Army 2.0'. Fifty-two trusted hackers participated in the Hack the Army 2.0 bug bounty challenge, reporting 146 valid vulnerabilities over the course of five-weeks.