Author Archives: Kevin Townsend
KPMG on Key Cybersecurity Considerations for 2020
KPMG’s Take on Key Trends and Requirements for Enterprise Cybersecurity for 2020 and Beyond
read more
Continue reading KPMG on Key Cybersecurity Considerations for 2020
Mismanagement of Device Identities Could Cost Businesses Billions: Report
The cost of poorly protected device identities has long been assumed, but not proven, to be large. Specification of the part played by SSH abuse within a breach report is rare despite compromised machine identities being used by attackers to hide their… Continue reading Mismanagement of Device Identities Could Cost Businesses Billions: Report
Fraudulent Login Attacks Against Banks Surge: Akamai
On August 7, 2019, a single credential stuffing attack against a financial services company recorded 55,141,782 malicious login attempts. To put that in perspective, it is more than twice the daily average (22,682,022) of credential abuse attacks detec… Continue reading Fraudulent Login Attacks Against Banks Surge: Akamai
Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform
Fidelis Cybersecurity has announced a raft of enhancements to its Fidelis Elevate platform, which comprises a network product, an endpoint product, and a deception product. The purpose of the platform is to help defenders understand their environment b… Continue reading Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform
ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business
Baltimore, MD-based ZeroFOX has raised $74 million in a new funding round led by Intel Capital and including existing vendors NEA, Highland Capital Partners, Redline Capital Management, Hercules Capital and Core Capital. It brings the total funding rai… Continue reading ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business
Rise in Malware Using Encryption Shows Importance of Network Traffic Inspection
The criminal use of encryption to hide malware is growing rapidly. In the first half of 2019 the use of encryption by malware almost equaled the entire encrypted volume of 2018, and is not likely to slow. Today, nearly a quarter of malware communicates… Continue reading Rise in Malware Using Encryption Shows Importance of Network Traffic Inspection
Egnyte Launches New Content Visibility and Control Platform
Mountain View, CA-based Egnyte is combining its Protect and Connect platforms into a single Content Services platform. As data has expanded, business has become more geographically dispersed, and data protection regulations have increased around the wo… Continue reading Egnyte Launches New Content Visibility and Control Platform
ExtraHop Expands Enterprise IoT Security Features
ExtraHop Takes Network Security and Visibility to the IoT Edge
read more
Continue reading ExtraHop Expands Enterprise IoT Security Features
New Backdoor Attacks Leverage Political Turmoil in Middle East
Two apparently politically motivated backdoor campaigns have been observed operating in the Middle East, targeting influential Palestinians. The aggressors are most likely the MoleRATs APT (aka The Gaza Cybergang, Extreme Jackal, Moonlight, and DustySk… Continue reading New Backdoor Attacks Leverage Political Turmoil in Middle East