Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Leverage Bromium Threat Cloud intelligence for real-time malware family and severity classifications Enjoy safe native browsing using Mozilla Firefox with risky sites isolated in Bromium Secure Browser Securely isolate the latest versions of Microsoft … Continue reading Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Why do capability-based security systems protect against the confused deputy problem?

According to Wikipedia (https://en.wikipedia.org/wiki/Confused_deputy_problem):

In information security, the confused deputy problem is often cited as
an example of why capability-based security is important, as
capab… Continue reading Why do capability-based security systems protect against the confused deputy problem?

Minerva Labs, CrowdStrike, & VMware – Enterprise Security Weekly #104

In the Enterprise News this week, VMWare launches Blockchain project, lacework raises new funds to extend Cloud Security capabilites, Minerva Labs achieves certified integration with McAfee ePO, CrowdStrike helps advance malware searches on hybrid anal… Continue reading Minerva Labs, CrowdStrike, & VMware – Enterprise Security Weekly #104

Ignite 2017: The Microsoft Teams and Skype for Business Communications Merger

Microsoft Teams and Skype for Business are heading towards a merger within Teams that will put what Microsoft calls “Intelligent Communications” into the collaboration service.

read more Continue reading Ignite 2017: The Microsoft Teams and Skype for Business Communications Merger

Why the U.S. is struggling with their digital war on ISIS

The U.S. military’s reported inability to effectively “drop cyber bombs” on the Islamic State is raising new questions about the military’s existing “cyber weapons arsenal,” a loosely defined collage of digital warfare capabilities shrouded in secrecy. Computer network attacks have been conducted by operators within the National Security Agency and U.S. Cyber Command, the military’s top cyber warfare unit, under the order of Joint Task Force Ares. While the two organizations are inherently aligned, the NSA and Cyber Command follow different missions and employ different capabilities. Very little is publicly known about either the intelligence community or U.S. military’s ability to conduct offensive cyber operations; the subject matter is generally considered classified if not highly sensitive. A leaked CIA document published by WikiLeaks in March and identified by CyberScoop provides a rare window into how analysts conduct cyber warfare operations; describing one instance in which an operator worked to remotely disrupt a […]

The post Why the U.S. is struggling with their digital war on ISIS appeared first on Cyberscoop.

Continue reading Why the U.S. is struggling with their digital war on ISIS