Home > RSS Feeds > Security
  • IBM extends its QRadar security intelligence platform with user behavior analytics to protect against insider threats.

  • A new CEO takes the reins as the company changes its name to Spirion to raise its profile as a provider of data loss prevention technology.

  • Following in the footsteps of WhiteHat Security, SentinelOne is providing a software security guarantee.

  • While SMS-based two-factor authentication isn't the most secure version of 2FA, it's still far better than not using 2FA, security expert Shaun Murphy tells eWEEK.

  • Security firm Bishop Fox will show off its new drone that can conduct aerial penetration tests at the Black Hat USA conference.

  • DB Networks has combined the elements of machine learning with data flow analysis to create an insider threat detection platform that couples evolving behavior models with rules-based execution. The company's Layer 7 Database Sensor can be incorporated into DB Networks' own DBN-6300 database cyber-security appliance or integrated into other OEM security appliances to bring deep protocol analysis to database traffic. DB Networks' offering brings a new paradigm to insider threat detection by incorporating a methodology known as data flow analysis. DB Networks defines a data flow as an entity that consists of 10 unambiguous attributes, which define communications with a database. The company's data flow analytics capability focuses on identity, target, payload, resources and data to determine the stability of an access event. Any transactions that fall out of the norms established by the machine learning-based models are considered suspect and can trigger various responses based upon defined rules. All that information is presented in easy-to-understand graphical dashboards that support full drill-down into individual data flows. This eWEEK slide show takes a closer look at how the DB Networks Layer 7 Database Sensor detects and responds to potential threats.

  • A lack of encryption affects at least eight manufacturers' low-cost wireless keyboards, allowing hackers to remotely "sniff" all the keystrokes of wireless keyboards from up to 250 feet away.

  • NEWS ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws have emerged and hundreds of millions of users remain at risk.

  • The security firm aims to better help organizations defend against the "Hacker Playbook," techniques used by attackers to infiltrate a network.

  • Updated guidelines from the National Institute of Standards and Technology say SMS-based two-factor authentication should be banned.

  • Microsoft is rolling out an Authenticator app, which reaches across both the enterprise and consumer segments of the software giant's customer base.

  • Cisco's Midyear Security Report finds challenges old and new as the overall volume of threats increase, but the time to find them is decreasing.

  • Rapid7 researchers found critical flaws in Osram Lightify connected bulbs and the Zigbee wireless protocol used to control them. Osram fixed most of the flaws.

  • Mainframe computers, personal computers, client/server systems, the Internet, mobile computing, cloud, multicloud, Internet of things (IoT): Information technology never stops evolving. Also evolving are our beliefs about trust and security and how we implement them to keep our connected world safe and secure. When PCs began selling worldwide in the early 1980s, security was not considered a fundamental component in any system that wasn't for military, government or scientific use. With the coming of the Internet in the early '90s, however, all of that changed very quickly; connected systems for businesses and consumers suddenly offered ample opportunities for bad actors to defraud others. We now know there are plenty of bad guys doing this. Now in 2016, we must constantly bolster and upgrade the security on our devices and systems to steer clear of those criminals. In this eWEEK slide show, Jim Reno, chief architect for security at Apcera, discusses how security in the enterprise has changed as new technologies and movements have been introduced, and what we can expect to see in the future.

  • provides decryption keys for Shade ransomware, with a plan to help end the scourge of ransomware.

Rocket Fuel