Nuclear Plants Can Boost Reliability with Predictive Maintenance

Credit to Author: Kim Custeau| Date: Mon, 31 Jul 2017 19:00:52 +0000

The rapid growth in electricity demand combined with movements to curtail emissions has created an opportunity for nuclear energy as a zero carbon emission energy source. However, in an industry… Read more »

The post Nuclear Plants Can Boost Reliability with Predictive Maintenance appeared first on Schneider Electric Blog.

Read more

A week in security (July 24 – July 30)

Credit to Author: Malwarebytes Labs| Date: Mon, 31 Jul 2017 19:21:14 +0000

A compilation of security news and blog posts from the 24th of July to the 30th. We talked about ransomware, the Dark Web, smart toys, encryption, and other.

Categories:

Tags:

(Read more…)

The post A week in security (July 24 – July 30) appeared first on Malwarebytes Labs.

Read more

Can Microsoft lawyers defeat Putin’s most notorious spy-hackers?

Credit to Author: Preston Gralla| Date: Mon, 31 Jul 2017 07:53:00 -0700

Russian’s spy-hackers have taken on almost a mythical status as more details have emerged about how they hacked the Democratic National Committee and the Clinton campaign and influenced the last presidential election. The National Security Agency and the entire U.S. intelligence community seem to be a step behind them, and the worst may be yet to come.

And now comes an unlikely potential savior: Microsoft’s lawyers. They’re using a combination of cyber-sleuthing and innovative legal filings to strike at one of Russia’s most dangerous cyber-espionage groups, Fancy Bear. So far, the tactic is paying off. But it’s not clear that Microsoft can defeat the hackers in the long run.

To read this article in full or to leave a comment, please click here

Read more

Bringing Your Cloud Visibility Back Into Focus

Credit to Author: Darlene Gannon| Date: Mon, 31 Jul 2017 12:58:00 +0000

Like data center sprawl, virtualization sprawl occurs when the numbers, locations, and functions of virtual machines distributed across a network grow to the point that they can no longer be managed effectively. As organizations continue to move applications and other core workloads into the cloud, virtualization sprawl can give way to “security sprawl” if not architected properly. In order to achieve the scale, elasticity, and efficiency benefits of the cloud, the data and security elements across all environments must be integrated,…

Read more

NSE Experts Academy CTF

Credit to Author: Axelle Apvrille| Date: Sun, 30 Jul 2017 21:00:00 +0000

At the end of this past June, Fortinet ran the NSE Experts Academy which featured for the first time a Capture The Flag (CTF) session. We welcomed close to 60 participants, and feedback was extremely positive. We congratulate the top 2 winners, with very close scores, teams YouMayNotWannaCry and ACSN. Our CTF had two specifications: While it included challenges on Fortinet products it was not limited to them – this was not a sales session but a technical one! For instance, while we had challenges on FortiSandbox, FortiCam, and FortiGate,…

Read more

Mobile Menace Monday: Malicious clicker with extra maliciousness included

Credit to Author: Nathan Collier| Date: Mon, 31 Jul 2017 14:00:42 +0000

A new malicious clicker has emerged onto third-party app stores.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Malicious clicker with extra maliciousness included appeared first on Malwarebytes Labs.

Read more

Promoting Online Safety in Canada: Trend Micro Launches Video Contest for Local Kids

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 31 Jul 2017 13:00:48 +0000

At Trend Micro we always strive to be a responsible corporate citizen. Right from the beginning the company has devoted significant time and resources to a variety of projects: from house building in the Philippines, to our Give and Match programs around the world designed to support vital community projects. However, a special focus has…

Read more

Five Mistakes I Bet You Are Making with your Managed Services business

Credit to Author: Ryan Delany| Date: Mon, 31 Jul 2017 12:00:23 +0000

As a managed service provider, your customers have entrusted you to manage their IT infrastructure and their security so it’s important that you are making the right choices to secure their environments and keep cyber criminals at bay. In my years of working with our Managed Service Provider partners, I’ve seen a number of mistakes…

Read more