Security News
HYAS, a leader in threat intelligence and attribution, announced HYAS Insight, a threat intelligence and attribution solution that improves visibility and productivity for analysts, researchers and investigators while vastly increasing the accuracy of their findings. HYAS Insight lets analysts connect specific attack instances and campaigns to billions of historical and real-time indicators of compromise faster than ever before, bringing invaluable new intelligence and visibility to security efforts.
With cyber criminals using multiple attack vectors to reach their targets, SecBI, a disruptive player in cyber defense, announced the launch of its XDR Platform, designed for continuous and automated threat detection, investigation and response on all attack vectors, with a Fortune 500 company among its first customers. SecBI's newly released XDR platform takes a multi-vector approach, applying a proactive layer of machine learning-based analytics across all endpoint, network, and cloud security tools.
A newly released report offers a glimpse into how European Union authorities are applying the General Data Protection Regulation to some of the biggest U.S. technology firms, including social media giants Facebook and Twitter. What makes Ireland a bellwether for GDPR is that many U.S. technology firms, including Apple, Facebook and Google, have designated Ireland as their "Main establishment" in the EU. Under GDPR, that enables them to qualify for a one-stop-shop mechanism, which ensures that the data protection authority in that country takes the lead on any EU privacy investigations.
Magnet Forensics released Magnet AXIOM Cyber, an innovative new solution purpose-built for organizations that need to perform remote acquisitions as well as collect and analyze evidence from cloud sources, computers and mobile devices. In addition to all the innovative features found in Magnet AXIOM, Magnet Forensics' best-in-class digital forensics solution, AXIOM Cyber enables investigators to remotely collect evidence from target endpoints.
Cybersecurity experts said Thursday there were still many unanswered questions from an investigation commissioned by Jeff Bezos that concluded the billionaire's cellphone was hacked, apparently after receiving a video file with malicious spyware from the WhatsApp account of Saudi Arabia's crown prince. The report further pointed to messages later sent from the prince's WhatsApp account to Bezos that showed "Apparent awareness" of private information.
FireEye, the intelligence-led security company, announced the availability of two new FireEye Mandiant services. Cloud Security Assessments help organizations evaluate and harden security in cloud platforms, and Cyber Defense Operations consulting services help organizations achieve security transformation by improving the detection and response capabilities of their security operations center.
In order to shift security postures from reactive to proactive positioning, organizations will need to re-evaluate their security strategy so that they are able to shape the attack surface to their advantage and make network traffic analysis solutions the cornerstone of their detection and response capabilities relied on by SOC teams. First, organizations need to know what their security stack contains - what capabilities are present and utilized, what capabilities are missing, and what capabilities may be duplicative.
Yet another squid acronym. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
US Dept of Justice books one-way plane ticket in his name A rape investigation involving everyone's favourite cupboard-dwelling WikiLeaker, Julian Assange, has been dropped, Swedish prosecutors...
Devo Technology, the data analytics company that unlocks the full value of machine data for the world’s most instrumented enterprises, announced a product integration with Demisto, a Palo Alto...