Security News

Acronis, a global leader in cyber protection announced at RSA Conference 2020 several advances in the company's modern cyber protection approach. As a result, an organization's data, applications, and systems are prime targets for cyberattacks - and since modern cyberthreats target backup files and systems, data, applications and systems need to be protected by proven data protection solutions that also integrate cutting-edge security capabilities.

SCYTHE, a leader in continuous adversarial emulation, is introducing the SCYTHE Marketplace at the RSA Conference 2020. The SCYTHE Marketplace opens up SCYTHE's synthetic malware creation platform to trusted third party developers so that they can turn their experience and expertise into new capabilities for a vibrant security ecosystem.

In a RSA 2020 simulation, the Red Team compromised email accounts, created deepfake videos and spread disinformation on Election Day in Adversaria.

As companies continue to grapple with the challenges of insider threats, machine learning coupled with behavioral analytics can assist in predicting and detecting potential threats from employees and contractors, according to a panel of security experts at RSA 2020. To mitigate insider threats, experts suggest that enterprises develop their own risk algorithms by coupling machine learning capabilities with behavioral analytics to understand discrepancies in employee activities.

There is a darker side to the Latin American hacking scene. "The cartels aren't using hackers to provide an alternative to drug money, just a relatively easy additional source of income - it's easier to use a hacker to syphon money out of an ATM than to break into one, or rob a bank."

Spam, ransomware, and malware continue to haunt organizations, but bad actors are also cooking up new spins on these tried-and-true methods, according to security company Fortinet. A report from Fortinet on the threat landscape for the final quarter of 2019 reveals that cybercriminals will exploit every possible opportunity, both new and old, to attack organizations and users alike.

With cyber criminals using multiple attack vectors to reach their targets, SecBI, a disruptive player in cyber defense, announced the launch of its XDR Platform, designed for continuous and automated threat detection, investigation and response on all attack vectors, with a Fortune 500 company among its first customers. SecBI's newly released XDR platform takes a multi-vector approach, applying a proactive layer of machine learning-based analytics across all endpoint, network, and cloud security tools.

Code42, the leader in insider threat detection, investigation and response, announced it has advanced its cloud data security solution with the second in a series of new capabilities designed to help companies defend against the rising tide of insider threats. The newest enhancements equip security teams to closely monitor, detect and investigate data threats caused by high-risk employees.

In a RSA 2020 simulation, the Red Team compromised email accounts, created deepfake videos and spread disinformation on Election Day in Adversaria. At RSA 2020, Cybereason assembled a group of journalists and other conference attendees to be the Red Team, in charge of creating just enough chaos to cause residents of the fictional city Adversaria to doubt the results of the election.

Organizations around the world are observing this Shadow IoT phenomenon, where employees are bringing unauthorized devices into the enterprise. Key findings Unauthorized IoT devices on the rise: The top unauthorized IoT devices include digital home assistants, TV set-top boxes, IP cameras, smart home devices, smart TVs, smart watches, and even automotive multimedia systems.