Eskenzi PR ad banner Eskenzi PR ad banner

News

Adaptiva Introduces The Future Of Vulnerability Management With Evolve VM At RSA Conference 2019.

Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, today launched a new endpoint compliance and vulnerability management product, Evolve VM™. Evolve VM harnesses Adaptiva's industry-leading peer-to-peer technology to automatically detect and remediate thousands of vulnerabilities on a massive scale and at the fastest speeds possible. The company will unveil Evolve VM at RSA Conference ! 2019, being held March 4-8 at Moscone Center in San Francisco. Evolve VM leverages...

Read more
Akamai Experience the Edge

Akamai (NASDAQ: AKAM), the intelligent edge platform for securing and delivering digital experiences, today announced enhancements designed to help businesses accelerate their cloud migration strategy. The new features protect content, apps, and APIs, accelerate web and mobile experiences, and help make development teams more agile as they move to the cloud. “Eighty-five percent of companies today have a hybrid cloud strategy, but many have begun to realize that the cloud brings significant challenges to security,...

Read more
it security guru

A bug exposed photos from up to 6.8 million users using third-party apps, . The exposed photos include those that users never finished sharing to the site, Facebook said. The disclosure is one of the company has grappled with over the past year. In March, reports from and shed light on how Cambridge Analytica used data on Facebook users to influence the 2016 U.S. presidential election. In September, it announced a that affected up to...

Read more
it security guru

Two days after Cisco patched a severe vulnerability in a popular brand of SOHO routers, and one day after the publication of proof-of-concept code, hackers have started scans and attacks exploiting the said security bug to take over unpatched devices. The vulnerability, tracked as CVE-2019-1663, was of note when it came out on February 27 because it received a severity score from the Cisco team of 9.8 out of a maximum of 10. Source: ZDNet

Read more
it security guru

North Korean hackers who have targeted American and European businesses for 18 months kept up their attacks last week even as President Trump was meeting with North Korea’s leader in Hanoi. The attacks, which include efforts to hack into banks, utilities and oil and gas companies, began in 2017, according to researchers at the cybersecurity company McAfee, a time when tensions between North Korea and the United States were flaring. But even though both sides...

Read more
it security guru

More than 3,000 GPs are at risk of breaching data protection laws if they sign up to a new way of sharing childhood vaccination data, the BMA has warned. The new extraction system, which shares immunisation data between GP systems and the Child Health Information Service (CHIS), could be sharing more data than the law allows. The new system uses a process that copies, transfers and stores the whole GP database, rather than the minimal...

Read more
it security guru

18 MongoDB databases with information generated by accounts on several online social services in China have been sitting on the web ready for plucking by anyone knowing where to look. It appears that they are part of a country-wide surveillance program that collects profile-related data (names, ID numbers, and photos) along with GPS locations, network info, public and private conversations, and file exchanges. Source: Bleeping Computer

Read more
it security guru

Public cloud adoption is growing by double-digit percentages year over year, and the public cloud market is expected to exceed $220 billion by the end of 2019, according to Gartner. However, the survey findings from Dimensional Research reveal that IT teams are often siloed and do not agree on who is responsible for the deployment and ongoing management of the public cloud network. Source: Help Net Security

Read more
it security guru

A detailed analysis of code and data from a command-and-control server responsible for the management of the operations, tools and tradecraft behind the Operation Sharpshooter campaign has revealed evidence that this global cyber espionage campaign is more extensive in complexity, scope and duration of operations.  The analysis led to identification of multiple previously unknown command-and-control centers, and suggest that Sharpshooter began as early as September 2017, targeted a broader set of organizations, in more industries...

Read more
deepsecure.jpg

Deep Secure, the creator of Content Threat Removal technology, today announces the launch of Content Threat Removal-as-a-Service (CTRaaS), a new cloud-based service that will stop organisations from falling victim to cyberattacks concealed in digital content. Cybercriminals are increasingly using content as a vehicle for spreading malware, ransomware and undetectable threats. Rather than detecting and protecting against these threats, Content Threat Removal creates an exact visual replica of any content that is shared with the organisation,...

Read more
Page 297 of 364 1 296 297 298 364