Security News
There's nothing like five or six days of in-depth training with SANS Institute to develop cutting-edge Digital Forensics and Incident Response security skills. Then how do you keep those skills honed day to day, week to week, and for free? By checking in regularly with the SANS DFIR page, which should be your go-to one-stop shop for a ton of DFIR resources.
Embedded systems - typically written in C and C++ - will be in more frequent use as our tech needs continue to grow and change, and specialized security training for the developers on the tools in this environment is an essential defensive strategy against cyberattacks. MISRA is a key organization that is in the good fight against embedded systems threats, having developed guidelines to facilitate code safety, security, portability and reliability in the context of embedded systems.
The British government is preparing to launch a full-scale policy assault against Facebook as the company gears up to introduce end-to-end encryption across all of its services. The backlash has already begun, showing that officials face a tooth-and-nail fight to derail the rollout of end-to-end encryption on the anti-social networking site and others in the Facebook estate.
From factory machinery that can analyze its sensor data for predictive maintenance, to driverless cars that can collect and process real-time traffic data without the cloud, the fast-approaching age of smart devices at the edge promises plenty for users and businesses. Let's dive deeper into the age of AI-powered devices at the edge and what it means for cybersecurity.
Managed edge services promises to be a high-growth market as enterprises look to low-latency edge services to address process efficiencies, support new consumer applications, comply with data sovereignty, and deal with security threats. According to a forecast from IDC, worldwide revenues for managed edge services will reach $445.3 million in 2021, an increase of 43.5% over 2020.
Calix announced the availability of Arlo Secure as a premium service offering for broadband providers within EDGE Suites, the cloud-enabled ecosystem of applications available as part of the full Revenue EDGE solution. Broadband service providers in the U.S. can now offer a state-of-the-art connected camera solution by leading smart home security brand Arlo Technologies as a fully managed, revenue-generating service accessible within EDGE Suites.
Node-as-a-Service StrongNode.io activates a unique approach to edge networking by harnessing idle resources from digital devices to build a strong, on-demand, and scalable node network and ecosystem. StrongNode is upending the traditional cloud computing paradigm and advancing decentralized networks to where technologies like blockchain and edge computing are meshed together to create the best value and experience for digital users.
Security engineers at Microsoft plan to rip out a key performance feature from the Edge browser in an experiment aimed at better measuring the tradeoffs between security, optimization and performance. The plan is to create a provocatively named "Super Duper Secret Mode" in Edge that deliberately disables support for the browser's JavaScript JIT compiler while adding a major anti-exploitation roadblock from Intel Corp. The new SDSM test - available in Edge preview builds select users - essentially rips out JIT, a feature that makes browsers run faster but data shows that these components introduce attack surfaces that have already been exploited in malware campaigns.
Microsoft has announced that the Edge Vulnerability Research team is experimenting with a new feature dubbed "Super Duper Secure Mode" and designed to bring security improvements without significant performance losses. When enabled, the new Microsoft Edge Super Duper Secure Mode will remove Just-In-Time Compilation from the V8 processing pipeline, reducing the attack surface threat actors can use to hack into Edge users' systems.
NETSCOUT SYSTEMS introduced NETSCOUT Smart Edge Monitoring to give IT teams complete visibility and insights to assure the highest-quality end-user experience in any network or application regardless of where employees perform their job. "IT organizations face big decisions in managing and advancing their networks and management approaches, which became even more urgent, during the pandemic on multiple fronts - from operations to optimization, from resolution to readiness, and from core and cloud to edge and client," stated Mark Leary, research director, network analytics, IDC. "To address the next normal in network management, ITOps needs to be able to diagnose whether applications, clients, services, or network infrastructure are causing performance problems. Here, it is vital to pinpoint and resolve service degradation issues across any domain rapidly and accurately."