This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 19 Oct 2018 15:48:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One™ enters as the evolution of Trend Micro’s endpoint security solution for enterprise. Also, learn about Java Usage Tracker’s new weakness and the conditions that enabled…

The post This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws appeared first on .

Read more

Policies and paper trails — our new best friends

Credit to Author: Sharky| Date: Fri, 19 Oct 2018 03:00:00 -0700

This IT pilot fish works with lots of sensitive data — and that means really sensitive, such as child abuse investigations.

“Until a few years ago, I had access to all that data, so I could write ad-hoc reports against it,” says fish. “We ‘systems’ people were given access to everything, so we could troubleshoot application problems for the users.

“Then one day I was called into the CEO’s office. He told me that according to the logs, I did a search against the Child Welfare data for a particular family on a date and time six months earlier — and wanted to know why I did the search.”

As best fish can recall, he was doing the search to troubleshoot a particular report that one caseworker was trying to run. To do that, he used his own workstation to duplicate the steps that the caseworker took to get to the error.

To read this article in full, please click here

Read more

How unlocking the potential of a smart building can reduce cost and boost business

Credit to Author: Carol LaRosa| Date: Thu, 18 Oct 2018 18:42:08 +0000

Urban migration is at its highest level and city buildings are under pressure to operate more efficiently. We are now seeing a shift towards smart buildings that embrace the internet… Read more »

The post How unlocking the potential of a smart building can reduce cost and boost business appeared first on Schneider Electric Blog.

Read more

CISO series: Building a security-minded culture starts with talking to business managers

Credit to Author: toddvanderark| Date: Thu, 18 Oct 2018 16:00:02 +0000

Protecting the company and its users against data leaks is no longer just the responsibility of IT and security operations. Everyone from the board to Firstline Workers has an important role to play.

The post CISO series: Building a security-minded culture starts with talking to business managers appeared first on Microsoft Secure.

Read more

Information operations on Twitter: new data released on election tampering

Credit to Author: Christopher Boyd| Date: Thu, 18 Oct 2018 15:00:00 +0000

New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.

Categories:

Tags:

(Read more…)

The post Information operations on Twitter: new data released on election tampering appeared first on Malwarebytes Labs.

Read more