Most companies fail to measure cybersecurity effectiveness

Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than 400 global business and security executives around the world. 58% of companies worldwide are failing to effectively measure their cybersecurity investments and performance Based on internationally accepted standards for security embodied in ISO 27001, as well as best practices from industry experts and professional associations, the Security Measurement Index … More Continue reading Most companies fail to measure cybersecurity effectiveness

Self-service perimeter security for the hybrid cloud

Skyport Systems, a secure hyperconverged infrastructure provider for the hybrid enterprise, announced at the Black Hat USA 2017 conference the release of new self-service capabilities aimed at increasing the security and agility of hybrid cloud application deployments across the enterprise. These new capabilities for Skyport’s signature SkySecure system will reduce the growing burden on IT departments by providing users with a set of self-service application deployment, policy management, and troubleshooting tools. Applications built for SaaS … More Continue reading Self-service perimeter security for the hybrid cloud

Defensive AI system implements strategies from the best analysts

Champion Technology Company, developer of DarkLight, an AI expert system for active cyber defense and trusted information sharing, today released their latest technology update with DarkLight 3.0. Almost half of all organizations say they can’t hire enough people with solid cybersecurity skills. The new DarkLight defensive AI is trained to think and act like a human analyst, implementing known strategies from the best defenders and analysts in the form of playbooks to discover and identify … More Continue reading Defensive AI system implements strategies from the best analysts

90% of consumers think security should be built into smart devices

90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform security firm Irdeto has found. IOT security awareness 78% of the 7,882 consumers surveyed indicated they are aware that any smart device connected to the Wi-Fi in their home has the potential to be targeted by a hacker, resulting in a cyberattack that could steal the personal … More Continue reading 90% of consumers think security should be built into smart devices

Malware creators increasingly run their business like legitimate software companies

The continuing increase in ransomware attacks is, partly, due to how easy the malware can be built and used by attackers that have limited technical skills. Take for example the Philadelphia Ransomware-as-a-Service (RaaS) offering. Offered for sale by a group (or individual?) that calls itself The Rainmakers Labs, it is just a part of the overall arsenal of “anti-security solutions” on offer: Philadelphia is a typical piece of crypto-ransomware and, as it’s usual with RaaS … More Continue reading Malware creators increasingly run their business like legitimate software companies

Secrets of successful threat hunters and SOCs

McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution of the security operations center (SOC). Per the survey, companies are investing in and gaining different levels of results from both tools and structured processes as they integrate “threat hunting” activities into the core security operations center. Key findings Looking at security teams through four levels of … More Continue reading Secrets of successful threat hunters and SOCs

Expected cyber threats over the next six months

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat actors are continuing to evolve their ability to avoid detection. The 2017 Cyber Threatscape Report examines key trends during the first half of 2017 and explores how cyber incidents may evolve over the next six months. It covers the increased prevalence of destructive attacks and adversary denial … More Continue reading Expected cyber threats over the next six months

CrowdStrike launches malware search engine

CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. CrowdStrike has built the largest searchable threat database in the cybersecurity industry, ingesting more than 51 billion security events a day, and indexing more than 700 million files totaling more than 560TB of malware that can be searched in real-time. With this launch, customers can take advantage of the data to significantly speed up … More Continue reading CrowdStrike launches malware search engine

Qualys CloudView to deliver continuous security of public cloud infrastructure

Qualys announced CloudView, a new app framework in the Qualys Cloud Platform for comprehensive and continuous protection of cloud infrastructure, delivering InfoSec and DevSecOps teams a “single pane of glass” view of security and compliance across cloud infrastructures. CloudView delivers to customers topological visibility and insight about the security and compliance posture of their complete public cloud infrastructure for major providers including Amazon Web Services (AWS), Microsoft Azure and Google Cloud. The first two apps … More Continue reading Qualys CloudView to deliver continuous security of public cloud infrastructure