Security News
First came 'fuzzing', a long-established technique for spotting bugs such as security flaws in real applications using automated tools. More recently, security fuzzing tools have expanded in number, and today there are hundreds of specialised open-source tools and online services designed to probe specific types of software.
The fate of the man accused of leaking top-secret CIA hacking tools - software that gave the American spy agency access to targets' phones and computer across the world - is now in the hands of a jury. Joshua Schulte stands accused of stealing the highly valuable materials directly from the CIA's innermost sanctum and slipping them to WikiLeaks to share with the rest of the planet.
Keysight's 5G Device Benchmarking Toolset speeds performance validation of 5G devices prior to market introduction. The toolset combines Keysight's UXM 5G Wireless Test Platform and Nemo Outdoor with new Nemo 5G Device Analytics software to deliver an integrated lab-based test solution that enables users to benchmark devices, troubleshoot, resolve issues and ultimately enhance product quality.
Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today's digital workplace, a Code42 survey reveals. Collaboration tools rated among top vectors for data exfiltration.
The Open Cybersecurity Alliance today announced the availability of OpenDXL Ontology, the first open source language for connecting cybersecurity tools through a common messaging framework. With open source code freely available to the security community, OpenDXL Ontology enables any tool to automatically gain the ability to communicate and interoperate with all other technologies using this language.
Providing managed security service providers with the world's best threat intelligence products, these additions offer extended benefits and accelerated growth opportunities to new and existing participants of the company's MSSP Partner Program. ScoutPRIME. A global attack surface management platform to help identify and manage potential security vulnerabilities associated with subsidiaries, partners, suppliers, and others outside of organizations' perimeter, it can be integrated with existing SIEM and big data solutions for a broader view and understanding of the potential impact of threats.
Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not working as expected, according to Keysight. "Enterprises are faced with a continuous stream of cyberattacks that threaten their businesses, and in many cases they attempt to deal with these by buying more security tools. Yet they don't know whether these products are delivering the protection they expect," said Scott Register, vice president, security solutions at Keysight's Network Applications & Security Group.
Finding what cloud services employees are using is half the battle-integrating Microsoft Cloud App Security and Defender Advanced Threat Protection lets you track, block, or audit cloud app usage. Microsoft Cloud App Security now includes a shadow IT discovery tool that integrates with Defender ATP to discover cloud app and service usage on any managed device.
Unlike PKI applications of the past, both PKI managers use a container-based, cloud-agnostic implementation that ensures fast and flexible on-premises, cloud and hybrid PKI deployments. DigiCert ONE is a holistic approach to modernizing PKI management and sets a new standard for fast and flexible PKI deployments.
The opportunity for tech pros lies in fully leveraging the benefits of APM across the entire application stack, so they can better communicate results to the organizations they serve. "To move beyond simply reactive troubleshooting, tech pros should consider modern APM tools as the keystone to connecting these previously siloed functions to gain comprehensive insight across the entire application stack."