1. Correlate

    Security Alert NSA Launches Cybersecurity Arm To Defend The U.S. From Foreign Adversaries

    The National Security Agency (NSA) has announced its intention to create a cybersecurity directorate this fall in a bid to defend the U.S. against foreign adversaries. It comes at a time of increasing election interference by foreign nations such as Russia as part of an ongoing strategy to...
  2. Aerdian

    Security Alert ThetaRay raises $30 million to grow its AI-powered cybersecurity business

    ThetaRay, a big data analytics company based in Hod HaSharon, Israel, today announced that it raised more than $30 million in a funding round led by Jerusalem Venture Partners (JVP), GE, Bank Hapoalim, OurCrowd, SVB Investments, and others. That puts its fundraising total to date at about $60...
  3. Aerdian

    Security Alert The Cybersecurity 202: Maryland ballot snafu offers lessons in how to respond to an election hack

    Maryland may be getting a dry run in how to respond to an election cyberattack. State officials say a computer glitch prevented the Board of Elections from updating voter registration data for as many as 80,000 voters. As a result, droves of people will have to cast provisional ballots if they...
  4. Linna Zheng

    Off-Topic An optimistic cybersecurity sci-fi: how would you write it?

    As far as I can see, news about cybersecurity tends to portray defenders on the losing side of the battle compared to attackers. I want to write an optimistic cybersecurity sci-fi where the defenders actually win - a story that can change the conversation from "Let's survive the cyber war" to...
  5. frogboy

    The World’s Biggest Military Contractors Don’t Encrypt Their Websites

    America’s largest defense contractors still don’t use HTTPS on their main websites. The websites of four of the five largest American defense and military contractors, which received a combined $95,278,712,971 last year from the US government, don't use web encryption. The main sites of...
  6. P

    Use Cases of a SIEM and How to implant a SIEM

    Hi there! I have to make a final master project and I would like to get some information about these things: 1. Use case to implant a SIEM, por instance: CASO | CATEGORIA | DEFINICIÓN | FUENTE | EPS Detectar USB infectado | malware | Caso para detectar... | "endpoint" | 44 2. As well I need...
  7. frogboy

    CrowdStrike launches malware search engine

    CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. CrowdStrike has built the largest searchable threat database in the cybersecurity industry, ingesting more than 51 billion...
  8. frogboy

    Perception and reality: The role of AI and automated cyber defenses

    Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic pernicious cyber threats, according to Radware. How do executives prioritize security? Each year, Radware publishes the...
  9. frogboy

    Singapore to collaborate with Australia on cybersecurity

    Singapore and Australia have inked an agreement to cooperate closely on cybersecurity, including information sharing, training, and joint exercises to safeguard critical information infrastructure. The two countries signed a Memorandum of Understanding (MOU) on Friday during the second...
  10. frogboy

    Australia to work with China on cybersecurity

    Prime Minister Malcolm Turnbull has agreed to enhanced cybersecurity cooperation with China. The federal government has announced it has agreed to enhanced cybersecurity cooperation with China, following discussions between Prime Minister Malcolm Turnbull, Foreign Minister Julie Bishop, and...
  11. T

    Creating a cybersecurity threat prevention platform in Africa

    Hello members - i am based in Africa, and was recommended malware tips by a security vendor partner of ours. I am part of a team that is assigned to understand and build a security threat prevention platform for businesses and governments in Africa. I hope to learn from the various experts in...
  12. frogboy

    Deception security doesn’t have to be onerous or expensive

    When talking about deception security, most infosec pros’ mind turns to honeypots and decoy systems – additional solutions that companies have to buy, deploy, and manage. But there are other ways to use deception to thwart attackers, and they do not require additional tools, pricy...
  13. frogboy

    VPN Firms Set for a Great 2017 Thanks to Snoopers’ Charter

    Virtual private network (VPN) providers are reporting an upsurge in interest from UK citizens keen to avoid state snoopers after the controversial Investigatory Powers Bill was passed. Despite widespread opposition from rights groups, legal experts and the public - but crucially not the Labour...
  14. frogboy

    Intentional or not, insider threats are real

    Despite the perception that hackers are a company’s biggest cybersecurity threat, insiders, including careless or naive employees, are now viewed as an equally important problem, according to a survey by Dimensional Research. Researchers found that 49 percent of IT security professionals...
  15. Spawn

    The Solution to Security Breaches

    Versus16 It's a computer security truism that human beings are the biggest network threat. Sysadmins have always assumed that means users, but it may be time to take a long, hard look in the mirror. ... The answer is to step away from the idea of security as preventing anything from entering...
  16. Spawn

    IBM opens New Security HQ with Massive Cyber Range

    "It was a big day for IBM today as it opened its shiny new security headquarters in Kendall Square in Cambridge, MA, complete with what the company is calling the first commercial cyber range. A cyber range is a network security testing environment, and is typically run by the military or...
  17. frogboy

    US Lawmakers Slam Opt-in Car Cybersecurity Guidance

    US regulators have urged car manufacturers to prioritize cybersecurity in the design of their vehicles, in a new voluntary set of guidelines. The National Highway Traffic Safety Administration (NHTSA) released on Monday Cybersecurity Best Practices for Modern Vehicles – what it claimed to be...
  18. frogboy

    Securing medical devices: Cybersecurity spending to triple by 2021

    The medical IoT is set to transform healthcare through smart medical devices. However, their success is in jeopardy if cybersecurity concerns are not addressed immediately. ABI Research believes that the millions of connected medical devices introduce dangerous new threat vectors into the...
  19. Y

    Unknown Malware Continues to Rise

    Last year, unknown malware downloads rose over 900% with more than 970 downloads per hour compared to 106 previously. Known and unknown malware, bots and mobile vulnerabilities – find out where your organization is most exposed in the 2016 Check Point Security Report. On an average day, known...
  20. frogboy

    Study finds gamer cyber hygiene stinks

    As online gaming grows in popularity ESET researchers found that cybersecurity measures haven't kept pace as 36 percent gamers reported actively turning off security software if they found it was slowing down their computer. The study, conducted by Google Consumer Surveys, polled 500 gamers and...