Security News
Deepwatch MOBILE gives cybersecurity experts real-time visibility into their SOC. deepwatch MOBILE provides customers real-time insight into their Security Operations Center and timely threat intelligence delivered to their mobile phone. ShiftLeft allows users to validate the accuracy of ShiftLeft CORE using OWASP Benchmark.
Expel for Microsoft automates security operations across the Microsoft tech stack. Expel for Microsoft automates security operations across the Microsoft tech stack, including Active Directory, AD Identity Protection, Azure, MCAS, Microsoft Defender for Endpoint, Office 365 and Sentinel.
British infosec businessees mostly support beefing up the Computer Misuse Act to directly tackle the ransomware crisis - while reform campaign CyberUp has written to Home Secretary Priti Patel offering "Support" for "a renewed, forward looking framework". A number of firms that spoke to The Register expressed firm support for changes to the act that make it easier for law enforcement to pursue and convict ransomware extortionists.
Fans of John le Carré's Tinker Tailor Soldier Spy know how top military secrets are extracted from the enemy. If head KGB spy Karla wanted to learn intricate details of the British military today, he'd just have to check WhatsApp.
NetWitness Cloud SIEM delivers cloud-based threat detection and response. Imperva Data Privacy protects and reports on personal data across all data assets.
The security team at Forrester busts a number of security myths. Recently, an op-ed sent information security Twitter into a tizzy by blaming cybersecurity industry best practices for recent high-profile security breaches.
A Fujitsu project management suite is causing red faces at the Japanese company's HQ after "Unauthorised access" resulted in data being stolen from government agencies, local reports say. The firm's ProjectWEB tool was reportedly accessed by an unidentified "Third party" who helped themself to data from, among others, Japan's Ministry of Foreign Affairs, its Cabinet Office Cyber Security Centre and the Ministry of Land.
Businesses operating in the word of infosec have been urged to write to the Home Office and support a public interest defence being added to the Computer Misuse Act. On a TechUK-organised call to discuss industry's response to the review of the act, British and overseas companies operating in the UK were urged by both the industry body and the Cyberup campaign to tell UK.gov what they think the law ought to say.
Where does the tip of the spear turn to for a helping hand? One popular avenue is to turn to a virtual CISO, an external consultant who can offer strategic advice, suggestions, and help find insights that can be instrumental in building better security systems. With that in mind, Chris Roberts, Cynet's chief security strategist is offering a new program to give InfoSec leaders a new avenue for support, advice, and valuable insights.
Designed to support modern security organizations increasingly delegating malware analysis to specific security operations or development security operations experts, the ReversingLabs Malware Lab solution equips these teams with a unified threat analysis engine and console to rapidly detect, classify, analyze, and respond to malicious files and associated Indicators of Compromise. Qualys CyberSecurity Asset Management brings security teams the automation they need.