Month: March 2017

ComputerWorldIndependent

1.37 billion records leak after spammers forgot to password-protect backups

Credit to Author: Darlene Storm| Date: Mon, 06 Mar 2017 06:19:00 -0800

Nearly 1.4 billion people are affected by a database records leak caused by spamming group River City Media (RCM) forgetting to password-protect their backups.

Last week, MacKeeper security researcher Chris Vickery promised a “1.4 billion identity leak story” would be made public on Monday. The actual number of people affected – 1,374,159,612 – is slightly lower than that, but is nothing to scoff at.

Read More
ComputerWorldIndependent

Okta acquires Stormpath to boost its identity services for developers

Credit to Author: Blair Hanley Frank| Date: Mon, 06 Mar 2017 06:18:00 -0800

Okta has acquired Stormpath, a company that provides authentication services for developers. The deal should help the identity provider improve its developer-facing capabilities.

Stormpath offered developers a set of tools for managing user logins for their apps. Rather than building a login system from scratch, developers could call the Stormpath API and have the company take care of it for them. Frederic Kerrest, Okta’s co-founder and chief operating officer, said that the acquisition should help his company build self-service capabilities for developers.

While Okta is probably best known for its identity and access management products aimed at businesses’ internal use, the company also operates a developer platform aimed at helping app developers handle user identity. Kerrest said that the developer capabilities are a fast-growing part of Okta’s business, but that its functionality could use some help. That’s where this acquisition comes in.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Review: vArmour flips security on its head

Credit to Author: John Breeden II| Date: Mon, 06 Mar 2017 04:45:00 -0800

Almost every cybersecurity program these days does some sort of scanning, sandboxing or traffic examination to look for anomalies that might indicate the presence of malware. We’ve even reviewed dedicated threat-hunting tools that ferret out malware that’s already active inside a network.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
SecurityTrendMicro

How To Get The Most From Google Next 2017

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 06 Mar 2017 13:00:44 +0000

Google’s Next 2017 conference kicks off today with a series of bootcamps. The regular program starts on Wednesday and runs through Friday, highlighting the latest offerings in the Google Cloud. This is the third iteration of the conference and as with the Google Cloud itself, the show is going to be bigger and better than…

Read More