Cybercrime

Leading Cyber and Physical Security Company Converged Security Solutions Acquires Maverick Cyber-Defense, LLC

Retrieved on: 
Tuesday, August 13, 2019

RESTON, Va., Aug. 13, 2019 /PRNewswire-PRWeb/ --Converged Security Solutions (CSS), a Virginia-based security company, is acquiring Virginia-based cybersecurity company, Maverick Cyber-Defense, LLC .

Key Points: 
  • RESTON, Va., Aug. 13, 2019 /PRNewswire-PRWeb/ --Converged Security Solutions (CSS), a Virginia-based security company, is acquiring Virginia-based cybersecurity company, Maverick Cyber-Defense, LLC .
  • CSS will further expand its end-to-end converged security solutions with the addition of Maverick's leading cyber defense services.
  • The addition of Maverick's services and team of subject matter experts is a critical addition to CSS' end-to-end converged security solutions.
  • Converged Security Solutions (CSS) offers comprehensive security services spanning cyber and physical security to allow the C-suite to better quantify, reduce, and manage security risk on an ongoing basis.

Minister Morneau announces new certification program and talent development pilot to enhance cyber security among Canadian businesses

Retrieved on: 
Monday, August 12, 2019

Taking the proper steps to enhance cyber security can help prevent monetary losses, keep valuable intellectual property safe, and protect the privacy of consumers and businesses.

Key Points: 
  • Taking the proper steps to enhance cyber security can help prevent monetary losses, keep valuable intellectual property safe, and protect the privacy of consumers and businesses.
  • Today, the Honourable Bill Morneau, Minister of Finance, launched the CyberSecure Canada certification program.
  • Minister Morneau also announced funding for Tech Impact , to help the organization with a talent development pilot for the cybersecurity sector.
  • CyberSecure Canada is a voluntary cyber security certification program that will help small and medium-sized organizations achieve a baseline level of cyber security, giving their customers greater confidence and providing these organizations with a competitive advantage.

Adlumin Launches Multi-Tenant, Cloud-Native Security and Compliance Automation Platform for Managed Service Providers

Retrieved on: 
Monday, August 12, 2019

ARLINGTON, Va., August 12, 2019 /PRNewswire-PRWeb/ -- Adlumin , a cybersecurity company dedicated to defending corporate networks from threats, malfunctions, and IT operations failures, launched their premier multi-tenant, cloud-native security and compliance platform built specifically for managed service providers.

Key Points: 
  • ARLINGTON, Va., August 12, 2019 /PRNewswire-PRWeb/ -- Adlumin , a cybersecurity company dedicated to defending corporate networks from threats, malfunctions, and IT operations failures, launched their premier multi-tenant, cloud-native security and compliance platform built specifically for managed service providers.
  • The platform empowers you to respond to discrepancies and return a customer to compliance within seconds.
  • About Adlumin : Adlumin is a leading cybersecurity service provider based in the Washington, D.C. area, serving a variety of global financial sector and government clients.
  • The Adlumin team continually evaluates and upgrades its revolutionary, machine learning-focused solutions to maintain the advantage over would-be intruders in the rapidly evolving cybersecurity sector.

(ISC)² Security Congress to Feature More than 200 Speakers and 175 Sessions Addressing Cybersecurity Industry's Most Pressing Issues

Retrieved on: 
Monday, August 12, 2019

The sessions will aid security leaders by arming them with the latest knowledge, tools and expertise to protect their organizations.

Key Points: 
  • The sessions will aid security leaders by arming them with the latest knowledge, tools and expertise to protect their organizations.
  • For the past nine years, (ISC)2 Security Congress has been a place where security practitioners come to engage with their peers and find serious solutions to real-world cybersecurity problems.
  • Most of the featured speakers who present are credentialed professionals who do the actual work of cybersecurity on a daily basis, just like the attendees.
  • This year's event will highlight several areas of cybersecurity that (ISC)2 members indicate they are interested in learning more about.

Global Automotive Cybersecurity Market: Focus on Cybersecurity Solution for Passenger Vehicles and Commercial Vehicles and Automotive OEMs Spending on Cybersecurity- Analysis and Forecast, 2019-2029

Retrieved on: 
Monday, August 12, 2019

Global Automotive Cybersecurity Market Forecast, 2019-2029

Key Points: 
  • Global Automotive Cybersecurity Market Forecast, 2019-2029
    The Automotive Cybersecurity Industry Analysis projects the market to grow at a significant CAGR of 14.25% during the forecast period from 2019 to 2029.
  • The industry analysis presents a detailed insight about the major market players in the global automotive cybersecurity market using the value chain analysis.
  • The automotive cybersecurity market segmentation on the basis of vehicle type is segregated into passenger vehicles and commercial vehicles.
  • The passenger vehicles segment dominated the global automotive cybersecurity market in 2018 and is anticipated to maintain its dominance throughout the forecast period.

Cyber Security Tips and Trends for Small Business

Retrieved on: 
Monday, August 12, 2019

While we're all focused on the day-to-day, however, it's easy to miss one of the most hazardous risks to businesses today: cyber security threats.

Key Points: 
  • While we're all focused on the day-to-day, however, it's easy to miss one of the most hazardous risks to businesses today: cyber security threats.
  • Finding ways to secure your business and tightening up your cyber security is crucial to protecting yourself, your business, and all of your clients, and PATLive's 5 tips are a good place to start.
  • The first thing you should do if you don't have any cyber security measures in place is to look at protecting your online system.
  • It's a start, but in order to truly protect your small business, you need to follow some basic password security measures.

Anomali Threat Research Team Discovers BITTER APT Phishing Campaign Targeting People's Republic of China Government Agencies

Retrieved on: 
Thursday, August 8, 2019

LAS VEGAS, Aug. 08, 2019 (GLOBE NEWSWIRE) -- BLACK HAT Anomali, a leader in intelligence-driven cybersecurity solutions, today published its latest research report: Suspected BITTER APT Continues Targeting Government of China and Chinese Organizations .

Key Points: 
  • LAS VEGAS, Aug. 08, 2019 (GLOBE NEWSWIRE) -- BLACK HAT Anomali, a leader in intelligence-driven cybersecurity solutions, today published its latest research report: Suspected BITTER APT Continues Targeting Government of China and Chinese Organizations .
  • The Anomali Threat Research Team discovered this new phishing attack leveraging spoof sites that appear to be designed to steal email credentials from target victims within the government of the Peoples Republic of China.
  • Although the attackers exact motivation is unknown, it is logical to conclude that this is an espionage campaign.
  • BITTER APT campaigns primarily target China, Pakistan and Saudi Arabia historically.

Anomali Threat Intelligence Manager Joakim Kennedy Presenting at Black Hat USA 2019 Arsenal

Retrieved on: 
Thursday, August 8, 2019

LAS VEGAS, Aug. 08, 2019 (GLOBE NEWSWIRE) -- Black Hat--Anomali, a leader in intelligence-driven cybersecurity solutions, today announced that Anomali Threat Intelligence Manager Joakim Kennedy is presenting at the Black Hat USA 2019 Arsenal.

Key Points: 
  • LAS VEGAS, Aug. 08, 2019 (GLOBE NEWSWIRE) -- Black Hat--Anomali, a leader in intelligence-driven cybersecurity solutions, today announced that Anomali Threat Intelligence Manager Joakim Kennedy is presenting at the Black Hat USA 2019 Arsenal.
  • As part of ongoing threat research, Kennedy is releasing his open source Go Reverse Engineering Tool Kit to anyone in need of a free resource to analyze and reverse engineer malware written in the Go language.
  • The need to extend skill sets to include research in this area is increasing.
  • Recently, the Anomali Threat Research Team discovered an attack targeting QNAP storage devices, where threat actors were utilizing ransomware written in the language: The eCh0raix Ransomware
    Kennedys session is today in the Oceanside Business Hall, Arsenal Station 1, from 1 - 2:20 PM PDT.

Anomali Exhibiting at Black Hat USA 2019

Retrieved on: 
Wednesday, August 7, 2019

LAS VEGAS, Aug. 07, 2019 (GLOBE NEWSWIRE) -- BLACK HAT-- Anomali, a leader in intelligence-driven cybersecurity solutions, is exhibiting at Black Hat USA 2019.

Key Points: 
  • LAS VEGAS, Aug. 07, 2019 (GLOBE NEWSWIRE) -- BLACK HAT-- Anomali, a leader in intelligence-driven cybersecurity solutions, is exhibiting at Black Hat USA 2019.
  • Visit booth #1114 on the exhibitor floor to learn why hundreds of organizations, including many of the Global 2000 and Fortune 500, rely on Anomali to harnesses threat data, information, and intelligence to drive effective cyber security decisions.
  • Making sense out of all of the threat data available in order to take effective action is one of the hardest challenges organizations face, said Anomali CEO Hugh Njemanze.
  • Weve combined technology, research and expertise to enable smart decision making that is reducing risk for the most highly targeted enterprises.

New Mimecast Report Reveals Analysis of 67 Billion Rejected Emails

Retrieved on: 
Tuesday, August 6, 2019

The report provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers.

Key Points: 
  • The report provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers.
  • Within the report, Mimecast Threat Center researchers outline tactics and techniques of emerging threats, active threat campaigns observed, primary threat categories and volume, and the top targeted sectors.
  • The Threat Intelligence Report covers the period between April and June 2019 and leverages the processing of nearly 160 billion emails, 67 billion of which were rejected for displaying highly malicious attack techniques.
  • In addition to this report, Mimecast also recently launched Mimecast Threat Intelligence, a value-added capability that gives customers a deeper understanding of the cyber threats their organizations face.