Turning Tables on Nigerian Business Email Scammers

Researchers from Dell SecureWorks infiltrated a Nigerian business email spoofing and business email compromise operation, shutting down a number of money mule accounts in the process. Continue reading Turning Tables on Nigerian Business Email Scammers

UnifyID’s ingenious user authentication platform wins Innovation Sandbox Contest

A panel of venture capitalists, entrepreneurs and large security companies selected UnifyID from a group of 10 finalists as the winner of the Innovation Sandbox Contest at RSA Conference 2017. The annual conference competition is a half-day program during which up-and-coming startups grab the spotlight and demonstrate groundbreaking security technologies to the broader RSA Conference community. Past winners include Sourcefire, Imperva and most recently Phantom. How does the UnifyID user authentication platform work? UnifyID is … More Continue reading UnifyID’s ingenious user authentication platform wins Innovation Sandbox Contest

Intel Security’s strategy for eliminating cybersecurity fragmentation

At RSA Conference 2017, Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation. The workforce shortage facing the cybersecurity industry makes it increasingly difficult to hire and retain employees. These scarce resources make it harder to maintain a coherent security architecture to prevent damage from and minimize the cost of emerging threats while embracing the potential of new open source, digital, cloud and security technologies. Intel Security’s research … More Continue reading Intel Security’s strategy for eliminating cybersecurity fragmentation

Targeted attack prevention in cloud email and messaging systems

GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native communication security platform, enabling organizations to tap into the threat data, machine-learning, and automated response framework that underpins GreatHorn’s threat detection and response solutions for social engineering, phishing, and targeted attack prevention in cloud email and messaging systems. 91% of targeted attacks begin with social engineering tactics, making the protection of … More Continue reading Targeted attack prevention in cloud email and messaging systems

U.S. consumers’ views on cybersecurity

To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the threat landscape, Kaspersky Lab and HackerOne surveyed over 5,000 U.S. consumers at least 16 years old. The results of the study, revealed at RSA Conference 2017, are as follows: State of cybersecurity and politics in the U.S. The research shows that Americans remain divided regarding what impact the new president will have on … More Continue reading U.S. consumers’ views on cybersecurity

Cybersecurity training management and skills assessment platform

No cost and open source cybersecurity massive open online course (MOOC) provider Cybrary announced the launch of its Teams training management and skills assessment platform at RSA Conference 2017. Designed for enterprise users, Cybrary Teams provides access to Cybrary’s training catalogue through a customizable in-browser dashboard. There, enterprises can manage its members, export member training data to their learning management system, track skill development and training progression, customize training requirements for enrollees, and expand access … More Continue reading Cybersecurity training management and skills assessment platform

Security programs not keeping up with IoT threats

More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their environment, according to new research from Pwnie Express. IT pros understand the dangers facing their companies, but don’t have the necessary solutions to address these new threats, including IoT malware, like Mirai. “Mirai demonstrated what the right malware could do if unleashed onto poorly configured … More Continue reading Security programs not keeping up with IoT threats