TweakTown NewsRefine News by Category:
RSA 2014 - PC and server maker Hewlett-Packard and security solutions company Trend Micro have teamed up to introduce new software to defend against targeted attacks. The new effort combines Trend Micro's Deep Discovery with HP's TippingPoint, with the new solution aimed at effectively detecting, reporting, and blocking data breaches.
HP relies on software and vendor products to help keep its PCs, servers, and other products protected - and creating custom partnerships will allow for a great opportunity to keep products more secure.
"Cyber criminals are going well beyond traditional malware and conventional attack vectors, and enterprise need protection that keeps pace and adapts faster than the adversaries," said Rob Greer, HP TippingPoint Enterprise Security Products, in a statement. "Collaborating with pioneering security companies like Trend Micro supports our mission to deliver the most comprehensive solutions on the market to block and remediate advanced threats."
Security company CloudFlare announced it has acquired StopTheHacker, a small company specializing in anti-malware software, with the San Francisco company strengthening its own product portfolio.
Financial information about the deal wasn't disclosed.
Due to an increase in malware sophistication, interest in stopping the malicious code has become a bigger action item. For current StopTheHacker customers, CloudFlare promises things will remain normal as the company is absorbed:
To help companies trying to embrace the "bring your own device" craze, Dell has launched its SonicWall mobile security platform for managed and unmanaged tablets and smartphones.
Dell included SonicWall Mobile Connect 3.0 and SonicWall secure remote access (SRA) 7.5 with its latest software update, giving administrators new abilities to ensure their networks are as secure as possible.
"In today's mobile workplace, it is vitally important to enable remote and mobile employees to maintain their productivity without compromising network security," said Patrick Sweeney, Dell Security Products Director of Product Management, in a press statement. "The co-mingling of business and personal applications and data on mobile devise presents an even greater challenge to IT when it comes to providing users with mobile access to everything they need to do their jobs, but still protecting corporate data - in-flight, at rest on the device, and on the network - from the multitude of threats posed by mobile devices."
Hewlett-Packard wants to push the boundaries of cyber threat collaboration, hoping to bring organizations together in an effort to share threat intelligence.
In 2013 alone, companies across the world spent an estimated $46 billion to counter cyberthreats - but the number of attacks actually increased 20 percent - and HP hopes to reduce the number of attacks.
"Collaboration is fueling unprecedented innovation in the criminal marketplace, enabling the ecosystem of adversaries to stay ahead of our defenses," said Art Gilliland, HP Enterprise Security Products SVP, in a press statement. "Crow-sourced threat intelligence from our vast community of customers, partners and researchers is essential in this battle against cyercrime; we need to stop chasing silver bullet technologies and start sharing actionable intelligence through our solutions, expertise and best practices if we are going to compete and win."
Around 80 percent of the top 25 small office/home office (SOHO) wireless routers available on Amazon are susceptible to security vulnerabilities that put users at risk, according to research recently compiled by security and compliance company Tripwire.
The Tripwire Vulnerability and Exposure Research Team (VERT) also found that 34 percent of the top 50 best-selling routers have publicly documented exploits out in the wild.
"Unfortunately, users don't change the default administrator passwords or the default IPs in these devices and this behavior, along with the prevalence of authentication bypass vulnerabilities, opens the door for widespread attacks through malicious web sites, browser plugins, and smartphone applications," said Craig Young, Tripwire security researcher, in a press statement.
During the RSA Conference 2014, Novetta Solutions and Teradata teamed up to develop the Novetta Cyber Analytics solution to help keep corporate networks more secure.
The new analytics platform will make it easier for security experts to accelerate interruption of attacks while also quickly identifying the who, what, where, when, and why regarding cyberattacks.
"Our customers want a cyber security analytics capability that minimizes the time between network intrusion, discovery and recovery," said John Buke, Teradata VP of industry marketing, in a press statement. "The new Novetta Cyber Analytics solution with Teradata's high-performance analytic data platform provides greater context and deeper perspective into data in motion on the network."
Cyber criminals are increasingly focused on exploiting vulnerabilities and installing malicious software for profit, with underground trading places providing tools to make cyberattacks easier. To make matters worse, there is an increasing number of criminals willing to modify malicious code - or rent their services - to groups willing to make payments.
Most organized hacking seems to be traced back to eastern Europe and China, but recently major exploits tend to indicate criminal groups in Spain and other parts of western Europe. However, some previous malicious code revealed code writers were intentionally trying to leave bread crumbs that would make authorities waste time searching elsewhere.
Hackers and cybercrime used to be a rather solitary effort, the ability to work as a team and share thoughts and ideas leads to more sophisticated attacks reaching the wild even faster.
Following former NSA contractor Edward Snowden's disclosure of widespread spying by the U.S. government, there has been a massive push to develop privacy-centric software and hardware. During the 2014 RSA Conference, which begins on Monday in San Francisco, data security and privacy solutions will be demonstrated at a frantic time in the industry.
In addition to the "Blackphone" being publicly unveiled, Google Android apps to better protect smartphones and tablets from sophisticated malware will also be shown off. Software security company AVG plans to release a "privacy fix" to identify what information companies can easily find about individual users.
The RSA Conference 2014 begins on Monday in San Francisco and has quite a bit of controversy and confusion heading into the event. In addition to increased security interest following former NSA contractor Edward Snowden's disclosures last year, the RSA brand is under fire for reportedly accepting payment to create a backdoor for NSA snooping.
RSA is expected to focus on mobile and cloud security, customer privacy, and better strategizing future security efforts. Large tech security conferences also tend to be a good location for corporations to look at technology created by smaller companies, with a flood of acquisitions expected in 2014.
Companies searching for new methods to keep networks safe and defend against cyberattacks are increasingly turning to strong authentication and one-time passwords, according to market research firm Frost & Sullivan.
Strong authentication is the technique used by banking and financial institutions, while one-time passwords are single-use passwords that better protect against phishing and other security breaches.
Smaller boutique security vendors have popped up to help fill the void in a booming security market. Since more companies and consumers are scrambling for security solutions this will lead to a market of acquisitions as larger companies gobble up smaller, niche security firms.