Month: May 2017

ComputerWorldIndependent

Trump's cybersecurity order pushes U.S. government to the cloud

Credit to Author: Michael Kan| Date: Thu, 11 May 2017 14:28:00 -0700

President Donald Trump has finally signed a long-awaited executive order on cybersecurity, and he called for the U.S. government to move more into the cloud and modernize its IT infrastructure.

The order, signed on Thursday, is designed to “centralize risk” and move the government’s agencies toward shared IT services, White House homeland security adviser Tom Bossert said in a press briefing   

To read this article in full or to leave a comment, please click here

Read More
FortinetSecurity

Deep Analysis of Esteemaudit

Credit to Author: Dehui Yin| Date: Thu, 11 May 2017 12:13:08 -0700

A Windows 2003 RDP Zero Day Exploit In this blog, the FortiGuard team takes a look at Esteemaudit, which is an exploit that was included in the set of cybertools leaked by the hacker group known as "Shadow Brokers." They claim that they collected this set of cybertools from the compromised data of "Equation Group," a threat actor alleged to be tied to the United States National Security Agency (NSA). Esteemaudit is a Remote Desktop Protocol (RDP) exploit that targets Microsoft Windows Server 2003 / Windows XP. The vulnerability…

Read More
FortinetSecurity

Byline: Security Platform vs. Security Fabric

Credit to Author: John Maddison| Date: Thu, 11 May 2017 06:42:08 -0700

Far too often, security tools are wrapped in marketing language that doesn’t always effectively communicate—or sometimes, even intentionally obscures—what a device or tool is able to do. Visit any security trade show and you are going to be overwhelmed by devices claiming to be “cloud enabled” or that offer “advanced threat intelligence.” But what do those terms mean? The same is true for entire classes of products.

Read More
SecurityTrendMicro

Teaming Up with HITRUST to Raise Cybersecurity Standards in Healthcare

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 11 May 2017 13:08:36 +0000

From cash-hungry hackers to state-sponsored spies and careless insiders, there’s no shortage of cyber threats facing healthcare organizations (HCOs) today. At Trend Micro, we’ve been protecting organizations operating in the industry for years, but the challenges facing these customers show no signs of abating. In fact, figures from the US Department of Health and Human…

Read More