Security Research News in Brief – October 2017 Edition
Credit to Author: Axelle Apvrille| Date: Thu, 09 Nov 2017 12:50:59 +0000
Welcome back to our monthly review of some of the most interesting security research publications.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Axelle Apvrille| Date: Thu, 09 Nov 2017 12:50:59 +0000
Welcome back to our monthly review of some of the most interesting security research publications.
Read MoreCredit to Author: John Maddison| Date: Wed, 08 Nov 2017 13:50:59 +0000
The growing need for on-demand network and compute resources is outpacing available internal resources, even in private cloud environments, and is driving organizations to the public cloud. According to IDC, 75% of organizations are currently implementing or considering the implementation of public cloud resources, and they predict that 50% of enterprise workloads will migrate to the public cloud by 2018. This new shared infrastructure approach comes with significant security challenges, including creating and maintaining a consistent…
Read MoreCredit to Author: Lief Koepsel| Date: Wed, 08 Nov 2017 13:50:59 +0000
Today, your customers’ IT teams have to be aware of the movement and storage of valuable data across multiple applications, networks, devices, and virtual environments. In order to ensure data security and achieve defense in depth, there are many processes they must carry out, such as: Monitoring the movement of data to ensure that only authorized users are accessing it. Watching out for unusual behavior that might indicate a breach. Staying aware of the latest vulnerabilities, malware strands, and other attack vectors to ensure…
Read MoreCredit to Author: Dario Durando| Date: Wed, 08 Nov 2017 12:50:59 +0000
Recently, the FortiGuard Labs team noticed that one of the most successful applications on the market, “WhatsApp Messenger” developed by “WhatsApp Inc.”, has been the target of a lot of attention by scammers and criminals alike.
Read MoreCredit to Author: Nat Smith| Date: Tue, 07 Nov 2017 15:45:59 +0000
Fortinet takes industry recognition and evaluations seriously, and we were very pleased when in their 4th Next Generation Intrusion Prevention System (NGIPS) Test Report and Security Value Map NSS Labs rated Fortinet FortiGate IPS as “Recommended,” their somewhat understated way of according a product their highest rating.
Read MoreCredit to Author: Jonathan Nguyen-Duy| Date: Tue, 07 Nov 2017 13:50:59 +0000
Digital transformation is rapidly reshaping industries, generating explosive productivity growth, and creating entirely new business models. The Internet of Things (IoT) is an important technology pillar in today’s digital transformation process, as connected devices are able to collect unprecedented volumes of information, enabling data-driven decision making for better business outcomes and improved quality of life. From consumer to corporate, local to global, we are an increasingly interconnected digital society. IoT networks…
Read MoreCredit to Author: Francois Ropert | Date: Mon, 06 Nov 2017 12:50:59 +0000
The T2 2017 conference took place on October 26 and 27, 2017 at the Radisson Blu seaside hotel in Helsinki, Finland. As in every edition, a CTF (Capture The Flag) competition is organized prior the conference, with the winner receiving a free ticket. This year, a private bug bounty was held by LähiTapiola, a well-known insurance company in Finland, under the supervision of T2 organizers through the HackerOne platform. As there were zero submissions, it was decided to reward Harri Kuosmanen, who was the LähiTapiola HackDay CTF winner. The…
Read MoreCredit to Author: Aamir Lakhani| Date: Mon, 06 Nov 2017 13:50:59 +0000
The growing complexity of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security wiring closet. Billions have been spent on this approach every year for decades, and we really don’t have much to show for it. If cybersecurity is an arms race, the good guys aren’t winning. Instead, security…
Read More