What Will A Russia-Ukraine Cyberwar Look Like?

Update March 4:  According to a Renysis Blog post from February 26 Ukraine has very resilient Internet connectivity not likely to be disrupted by a single event.  According to Reuters Tuesday Valentyn Nalivaichenko, the head of Ukraine’s SBU security service,  told a news briefing “I confirm that an IP-telephonic attack is under way on mobile phones of members…

Details

Seculert Delivers Advanced Threat Protection as a Cloud-based Solution

Two months since the news of the massive Target breach broke, reports are starting to reveal bits and pieces of how the perpetrators were able to get a foothold inside Target’s point of sale system to steal tens of millions of customer account records. In time, there will be a complete forensic analysis of the…

Details

Cylance Enters End-Point Protection Space

Cylance is a new vendor in the end point protection space. They caught my attention with a completely new way to discover malware on Windows devices. In addition to launching their CylancePROTECT product this week they just announced a $20 million funding round from Blackstone, Khosla Ventures, Fairhaven Capital and private investors. There are now four ways to identify malware. The…

Details

Removing Administrator Rights Blocks Critical Microsoft Vulnerabilities

Chalk one up for the “It’s so obvious when you think about it,” files. Removing administrator rights from Windows user accounts can block–or at least, slow down–most critical malware infections, according to a new report from Avecto. Of the 147 vulnerabilities published by Microsoft in 2013 with a “critical” rating, meaning that attackers would be…

Details

AlienVault Adds New Partners to Its Crowd-Sourced Threat Intelligence Platform

AlienVault has added new partners to its crowd-sourced threat intelligence platform to improve information sharing between private sector organizations, security vendors, and government organizations. The AlienVault Open Threat Exchange program provides real-time threat data to thousands of private sector companies, security vendors, and government institutions. Over 8,000 sites across 140 countries have participated in OTX…

Details

Vormetric Introduces Application Layer Encryption Solution

Vormetric has announced a new application encryption tool kit, which equips corporate IT departments with the ability to create and integrate encryption in their own applications. The new solution, called Vormetric Application Encryption, extends Vormetric’s data security platform with tools to encrypt data at rest within the enterprise and web applications, as well as cloud and…

Details

Cyberoam Now 100 Percent Subsidiary of Sophos

Post the recent Sophos acquisition of Cyberoam its CEO and MD Hemal Patel gives securitycurrent more information on the terms and what the acquistion means. sc: Sophos already acquired a UTM vendor. What did they see in Cyberoam that complemented or even replaces their current UTM offering?  Hemal Patel: “Sophos and Cyberoam complement each other in many ways…

Details

NIST Releases Long-Anticipated Framework for Improving Critical Infrastructure Security

The National Institute of Standards and Technology (NIST) has released the long-anticipated Framework for Improving Critical Infrastructure Security. The framework, released on February 12th, provides critical infrastructure operators with a broad blueprint of how to defend IT and industrial control systems networks that handle sensitive and critical tasks for a broad range of industries, including energy,…

Details