Proofpoint acquires Wombat Security Technologies for $225 million

Proofpoint has announced it has entered into an agreement to purchase Pittsburgh-based Wombat Security Technologies for $225 million in cash. By acquiring Wombat, the Sunnyvale, California-based company adds phishing simulation and security training to its suite of products. Proofpoint’s established products and solutions include email security, advanced threat protection and data archiving. Proofpoint also will incorporate Wombat’s PhishAlarm into its threat intelligence products, with the goal of providing broader visibility and intelligence when it comes to phishing attacks. More than of half of all respondents (53 percent) to a Wombat-authored study dealt with spearphishing attacks in 2017. Because threat actors target employees as the weakest link, companies need to continuously train employees and arm them with real-time threat data,” said Gary Steele, Proofpoint CEO, in announcing the deal Tuesday. “The acquisition of Wombat gives us greater ability to help protect our customers from today’s people-centric cyberattacks, as cybercriminals look for new […]

The post Proofpoint acquires Wombat Security Technologies for $225 million appeared first on Cyberscoop.

Continue reading Proofpoint acquires Wombat Security Technologies for $225 million

Professionally Evil Web App Pen Testing 101 Course

Since our founding in 2010 Secure Ideas has always tried to focus on education and increasing the amount of available knowledge in our field.   As such we have contributed to courses, presented at conferences around the world and contributed … Continue reading Professionally Evil Web App Pen Testing 101 Course

Here’s what the military’s ‘flight simulator’ for cyber warfare might look like

The U.S. Army is experimenting with all different types of training for its cyber commands, including the creation of virtual classrooms for its “cyber warriors.” The training is part of the Army’s persistent cyber training exercise, also known as PCTE.  The exercise offers a view of how the military might one day educate future U.S. Cyber Command recruits. Recently ordered to be raised to its own unified command, U.S. Cyber Command is an increasingly powerful and influential military component involved in both offensive and defensive cyber operations. When the U.S. Army’s Program Executive Office for Simulation, Training, and Instrumentation (PEO STRI) originally issued a request for information about the PCTE nearly two years ago, they described it as: “a training platform that allows cyber mission forces (CMF) to train in emulated network environments … [which] will largely focus on integration of available applications, enabling increased automation to ultimately support multiple simultaneous training […]

The post Here’s what the military’s ‘flight simulator’ for cyber warfare might look like appeared first on Cyberscoop.

Continue reading Here’s what the military’s ‘flight simulator’ for cyber warfare might look like

What is CCSP Certification?

Cloud computing is an information technology paradigm that offers an innovative business model for enterprises to adopt IT services without prior investment. Although cloud computing has various advantages, enterprises hesitate to accept it because of … Continue reading What is CCSP Certification?

Let’s Not Be Our Own Worst Security Enemy

If you are like most infosec professionals, you probably have to evaluate the security awareness training program that will be used in your organization. These training programs are important, and more recently, they are required in many regulated orga… Continue reading Let’s Not Be Our Own Worst Security Enemy

5 Things We Need from ACL in 2018

Here’s the 5 things I’m hoping will change in 2018 regarding ACL. They are all related to each other and feed off each other… Interesting. One) The ACL Analytics user interface (UI) finds a good plastic surgeon. While I have crit… Continue reading 5 Things We Need from ACL in 2018

A Look Back at 2017 — Digital Security Lessons Learned

2017 was a busy year full of malware attacks and data breaches. Yes, these events caused (at least) their fair share disruption and damage. But as the year draws to a close, our attention should move beyond those immediate consequences in an effort to … Continue reading A Look Back at 2017 — Digital Security Lessons Learned

My Azure Infrastructure Highlights of 2017

Aidan Finn reviews his highlights in the last year of Azure infrastructure improvements. Please share your highlights too.

The post My Azure Infrastructure Highlights of 2017 appeared first on Petri.

Continue reading My Azure Infrastructure Highlights of 2017