Security News
A recent survey of security operations effectiveness found that just 37 percent of security professionals have hard evidence to verify their security products are configured and operating correctly. It's critical that organizations implement an in-depth testing strategy to close these security gaps and cut the risk of being breached, rather than simply trusting and hoping their security products are performing as expected.
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced the release of the UHD100T32 100 Gigabit Ethernet test system, the industry's first test system purpose-built to help data center operators and network equipment manufacturers meet the density and cost-per-bit challenges of validating 100GE devices and networks. Keysight's new UHD100T32 test system, co-developed with Barefoot Networks, an Intel company, is purpose-built to meet the requirements of the modern networking infrastructure ecosystem.
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, launched the Keysight N9021B MXA X-Series Signal Analyzer which provides design validation and manufacturing engineers with superior phase noise performance at higher frequencies, and includes software that improves workflows while meeting 3GPP 5G new radio compliance standards. The new Keysight N9021B MXA X-Series Signal Analyzer offers an enhanced frequency sweep algorithm, accelerating test time improvements with uncompromising performance.
Tuesday's presidential primaries across 14 states mark the first major security test since the 2018 midterm elections, with state and local election officials saying they are prepared to deal with everything from equipment problems to false information about the coronavirus. Election officials have been warning the public not to expect complete unofficial results on Tuesday night, and that results could fluctuate as ballots come in and are counted over several days.
SCYTHE, a leader in continuous adversarial emulation, is introducing the SCYTHE Marketplace at the RSA Conference 2020. The SCYTHE Marketplace opens up SCYTHE's synthetic malware creation platform to trusted third party developers so that they can turn their experience and expertise into new capabilities for a vibrant security ecosystem.
The new capability provides an isolated test or QA environment within the production setup for security operations teams to test, tune, and validate new use cases prior to pushing them to live production. With Securonix Analytics Sandbox, the teams responsible for developing SIEM content can test and fine-tune use cases against real production data without impeding SOC efficiency.
Study for the CISSP exam anytime, anywhere using Official² CISSP flash cards. This free interactive self-study tool tests knowledge across all eight CISSP domains and gives you immediate feedback to reinforce learning.
Penetration testers looking at commercial shipping and oil rigs discovered a litany of security blunders and vulnerabilities - including one set that would have let them take full control of a rig at sea. Making heavy use of the word "Poor" to summarise what he had seen over the past year, Hearne wrote that he and his colleagues had examined everything from a deep water exploration and the aforementioned drilling rig to a brand new cruise ship to a Panamax container vessel, and a few others in between.
The forensic engineers who help police gather evidence understand this even if it's not always been clear which methods are the most effective as extracting data accurately enough for it to meet standards of evidence. To examine the issue, the US National Institute of Standards and Technology says it recently conducted tests using 10 popular Android smartphones careful loaded with a mix of data accumulated during simulated use.
Criminals sometimes damage their mobile phones in an attempt to destroy data. Manufacturers use those taps to test their circuit boards, but by soldering wires onto them, forensic investigators can extract data from the chips.