VENOM Vulnerability Could Take Bite Out of Your Week

The greatest fear of anyone running a virtual machine especially in a shared hosting environment is that an attack against one VM could jump the wall and impact the other VMs on the same machine; a so called guest escape. CrowdStrike, a vendor of host-based security solutions, announced today that one of its Senior Security…

Details

Security Current’s Chief Information Security Officers (CISOs) Name SentinelOne Winner of Its Inaugural Security High Stakes Competition

Security Current today named SentinelOne the winner of its inaugural Security High Stakes competition.  The event was held at the RSA Conference in San Francisco and brought technology providers face-to-face with security experts. Six cutting edge security vendors were given 15 minutes each to get the attention of a panel of 20 CISOs from leading organizations. The…

Details

Tech Vendors Look to Singapore as Hub for Asian Headquarters

Singapore is quickly becoming the country of choice for technology vendors seeking to establish a hub in Asia. Ranked first in Asia, and seventh worldwide, in the Global Innovation Index (GII) 2014, Singapore was noted for its business and regulatory environment, and for its knowledge absorption. The GII is published by Cornell University, INSEAD and…

Details

The Rise and Rise of Bad Bots – Part 2 – Beyond Web-Scraping

Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite dating from the late 1950s, remain in widespread use. Although organizations are reliant on these applications they are often impossible to change as the original…

Details

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

In 1995 a small security reseller in Southfield, Michigan, introduced possibly the first “cloud” based firewall: Check Point FW1 running on Sun Netra boxes in their small data center. Netrex would configure T1 connections from their customers’ routers to their data center and manage all of the firewall policies for them. As they developed their…

Details

Approaching the Singularity in Situational Awareness

The gravity well of situational awareness has been pulling on us since the earliest days of information protection. The ever-increasing sophistication of threats and compounding complexity of our systems is accelerating us down that path and narrowing our options. As we approach this singularity the choice to continue flying blindly through cyberspace is rapidly becoming…

Details