Security News
The near future evolution of the Virtual Analyst is being driven by two competing and intwined motions -the growing need for real-time threat response, and the inaccessibility of deep security knowledge and expertise. Although that Virtual Analyst capability will be tightly bound to a product, the second Virtual Analyst motion centers around access to deep security expertise.
Netop, the company behind a popular software tool designed to let teachers remotely access student computers, has fixed four security bugs in its platform. "In Netop Vision Pro 9.7.2, released in late February, Netop has fixed the local privilege escalations, encrypted formerly plaintext Windows credentials, and mitigated the arbitrary read/writes on the remote filesystem within the MChat client," according to a Sunday report by the McAfee Labs Advanced Threat Research team, which discovered the flaws.
Microsoft has added new features to Windows 10 Virtual Desktops that allow you to customize them to your liking. Windows 10 currently allows you to create virtual desktops that you can use to launch applications and files that will not appear on your main desktop or other virtual desktops.
Phishing sites are now using JavaScript to evade detection by checking whether a visitor is browsing the site from a virtual machine or headless device. Cybersecurity firms commonly use headless devices or virtual machines to determine if a website is used for phishing.
Microsoft has revealed that its Azure IaaS platform now offers free a virtual trusted platform module. Dubbed "Azure Trusted Launch for virtual machines" and launched as a preview on March 8th, Microsoft's CTO for Azure Mark Russinovich said the new offering "Allows administrators to deploy virtual machines with verified and signed bootloaders, OS kernels, and a boot policy that leverages the Trusted Launch Virtual Trusted Platform Module to measure and attest to whether the boot was compromised."
Intel announced that it has signed an agreement with Defense Advanced Research Projects Agency to perform in its Data Protection in Virtual Environments program. The multiyear program represents a cross-team effort across multiple Intel groups, including Intel Labs, the Design Engineering Group and the Data Platforms Group, to tackle "The final frontier" in data privacy, which is computing on fully encrypted data without access to decryption keys.
IBM announced availability of Red Hat software on IBM Power Systems as well as new IBM Power Systems hardware. New IBM Power Private Cloud Rack solution - Providing clients an optimized, production-level OpenShift platform to modernize traditional environments with cloud-native applications, the IBM Power Private Cloud Rack combines on-premises hardware, a complete software stack of IBM and Red Hat technology, and installation from IBM Systems Lab Services to deliver 49% lower cost per request as compared to similarly equipped x86-based platformsii.
SecurityWeek today announced its official lineup of virtual cybersecurity events for the remainder of 2021. SecurityWeek's Security Summits series is designed to allow participants from around the globe to immerse themselves in a virtual environment to discuss the latest cybersecurity threats and challenges facing enterprise organizations.
How can military experience help build resilience in information security? What lessons in perseverance and resilience can we pick up from an aerospace consultant who learned them the hard way in the wake of the NASA Challenger tragedy? Or, perhaps, you want to know more about how pentesting works in practice and hear advice by CISOs on how to manage infosec programs?
read more