TELUS completes successful testing of Neustar’s STIR/SHAKEN solution

Neustar, a trusted, neutral provider of real-time information services, and TELUS, one of Canada’s largest telecommunications companies, announced a successfully completed test of Neustar’s Certified Caller software suite deployed in TELUS’s NFV lab en… Continue reading TELUS completes successful testing of Neustar’s STIR/SHAKEN solution

The latest DDoS attacks are mostly multi-vector and morph over time

DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage to brands, according to Neustar. Also, when comparing Q1 2019 vs. Q1 2018, the company has registered a 200 percent increase of attack… Continue reading The latest DDoS attacks are mostly multi-vector and morph over time

Neustar Research shows large attacks growing as multi-vector exploits increasingly become the norm

Neustar Security Operations Center (SOC) saw growth at both sides of the attack size spectrum with 77% of attacks using two or more vectors in Q1, 2019 APRIL 24, 2019 – STERLING, Va. – Neustar, Inc., a trusted, neutral provider of real-time information… Continue reading Neustar Research shows large attacks growing as multi-vector exploits increasingly become the norm

Neustar, BlackBerry, and ShieldSquare – Enterprise Security Weekly #121

    Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud… Continue reading Neustar, BlackBerry, and ShieldSquare – Enterprise Security Weekly #121

LogRhythm, SOAR, and A Huge Acquisition – Enterprise Security Weekly #113

LogRhythm advances NextGen SIEM security platform with SOAR, Ping Identity launches a Quickstart private sandbox, McAfee takes a big step in the cloud, Endgame improves Endpoint Security with Total Attack Lookback, and we have some acquisition updates … Continue reading LogRhythm, SOAR, and A Huge Acquisition – Enterprise Security Weekly #113

Infosec experts to consumers: You’ve got the power

Consumers need to use their buying power to send a message that they value security, experts said Saturday during a panel at the 2018 South by Southwest Interactive Conference in Austin. The panel, dubbed “Welcome to the ‘Internet of Threats’” intended to break down concerns in a rapidly-changing security landscape where more and more devices are being connected to the internet.  These devices sometimes have no reason to be connected to the internet and often come from companies that have spent little time considering privacy or security matters. “How many of you are quite used to seeing something in the news around a data breach, or product that was insecure?” said John Gift, director of information security at Domino’s Pizza, during the panel.  “A lot of these organizations, they do recover relatively quickly, which is a great thing, but… understand your power with regards to: if something does happen and […]

The post Infosec experts to consumers: You’ve got the power appeared first on Cyberscoop.

Continue reading Infosec experts to consumers: You’ve got the power

The Trump administration is looking for its ‘cyber moonshot’

Tech advisors to the Trump administration are looking for a cybersecurity “moonshot” — a single national target that will be a game-changer in online security. But a meeting of a blue-ribbon telecommunications panel this week suggested that defining such a goal is still some way off. “This is the beginning of a conversation,” Scott Charney, vice chairman of the president’s National Security Telecommunications Advisory Committee told CyberScoop during a break in the proceedings at a public meeting Wednesday. “This current approach [to cybersecurity] isn’t working,” added Charney, a former Justice Department cyber prosecutor and current Microsoft VP. “The breaches keep on happening.” NSTAC met in the shadow of the recent Equifax breach — in which hackers were able to steal Social Security numbers for over 145 million Americans, by exploiting an unpatched vulnerability in their web application software. The committee was unable to achieve a quorum and so did not conduct any formal business. Charles […]

The post The Trump administration is looking for its ‘cyber moonshot’ appeared first on Cyberscoop.

Continue reading The Trump administration is looking for its ‘cyber moonshot’

Barrett Lyon, Neustar – Startup Security Weekly #57

Barrett Lyon is the Vice President of Research and Development for the Neustar Security Solutions’ portfolio. He spearheads the development of innovative new products and solutions for the company’s industry-leading DDoS, DNS and cybersecurity solutions. He shows us how he does it all! Full Show Notes Visit http://securityweekly.com/category/ssw for all the latest episodes!

The post Barrett Lyon, Neustar – Startup Security Weekly #57 appeared first on Security Weekly.

Continue reading Barrett Lyon, Neustar – Startup Security Weekly #57

Everyone is working on their own ways to secure IoT

If there’s one thing that alarms even the hardened cybersecurity veterans at the Black Hat convention this year, it’s the huge attack surface represented by the burgeoning internet of things — and at least two researchers are presenting solutions designed to secure connected devices. Mikko Hypponen, chief research officer for F-Secure was touting his company’s solution for consumer devices; and Brian Knopf, Neustar’s senior security researcher gave a presentation about an alternative to Public Key Infrastructure encryption that enterprises can use to secure their IoT devices. “PKI is awful,” Knopf told CyberScoop, “It works OK for browsers … but it wasn’t designed for IoT devices … The problem is the scale.” PKI is a form of asymmetric encryption, in which users have a private key and a public key. Anyone with the public key can encrypt a message, which can then only be unscrambled with the private key. PKI is the basis for most internet […]

The post Everyone is working on their own ways to secure IoT appeared first on Cyberscoop.

Continue reading Everyone is working on their own ways to secure IoT