Blue Coat, from Surf Control to Riding the Security Wave

BOB TARZEY | February 4, 2016

article image
The IT security sector is good for producing start-ups that soon disappear, seemingly without a trace. Of course, this is not a bad thing. Whilst it is true some wither on the venture capital vine, many others get acquired as the good idea they came up with (or imitated) gets recognised as a necessity and then absorbed into the security mainstream though acquisition. In this way whole genres of security products have more or less disappeared. For example, most spam-filtering, SSL VPN and data loss prevention (DLP) vendors have been absorbed by the security giants; Symantec, Intel Security (nee McAfee), Trend Micro or other large IT vendors that deal in security—HP, IBM, Microsoft etc.

Spotlight

Buckeye Business Solutions LLC

Network Applications: Network Architecture, Intranets/Extranets, Custom Applications, Server Migrations, Back-up Solutions, Tape Backups, RAID Solutions, Off-site Solutions, Power Protection. Office Networking: Centrally managed Anti-Virus, Centrally Managed patches, Shared Files & Printing, Application Services, End User Support, E-mail Solutions, Routine Service, Web Servers, Database Management

OTHER ARTICLES

How the IIoT can subdue cyber security challenges met by software adoption

Article | February 25, 2020

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platforms Magic Quadrant report, by 2023 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms. IIoT platforms and software adoption is rapidly increasing – up 15% in 2019 – and this will undoubtedly continue to grow as we progress through the new decade. From enhancing operational performance to improved business processes, adopting new technology and software capabilities is vital for business success in today’s industrial sector. However, when it comes to adopting software and technology, integrating new systems with existing legacy systems in the industry can be a challenge.

Read More

Webroot: Widespread Lack of Cybersecurity Best Practices

Article | February 25, 2020

A new list of most and least cyber secure U.S. states shows a disturbing lack of cybersecurity best practices. According to Webroot‘s fourth annual ranking, New York, California, Texas, Alabama and Arkansas are the least cyber secure states in the country, while Nebraska, New Hampshire, Wyoming, Oregon and New Jersey are the most cyber secure. Tyler Moffitt, Webroot security analyst, tells us none of the states had an average score greater than 67%. Also, there is very little difference between the most secure and least secure states, he said. No state scored a “C” grade or higher. That underlines a lack of cybersecurity education and hygiene nationally. However, the most cyber secure state (Nebraska at 67%) did score substantially better than the least (New York at 52%). This score was calculated through a variety of action- and knowledge-based variables, including residents’ use of antivirus software, use of personal devices for work, use of default security settings, use of encrypted data backups, password sharing and reuse, social media account privacy, and understanding of key cybersecurity concepts like malware and phishing,” Moffitt said.

Read More

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

Article | February 25, 2020

This week was filled with wide-scale calamity. Hundreds of millions of PCs have components whose firmware is vulnerable to hacking which is to say, pretty much all of them. It's a problem that's been known about for years, but doesn't seem to get any better. Likewise, Bluetooth implementation mistakes in seven SoC—system on chips—have exposed at least 480 internet-of-things devices to a range of attacks. IoT manufacturers will often outsource components, so a mistake in one SoC can impact a wide range of connected doodads. The most troubling part, though, is that medical devices like pacemakers and blood glucose monitors are among the affected tech. YouTube Gaming, meanwhile, wants to take Twitch's crown as the king of videogame streaming. But its most-viewed channels are almost all scams and cheats, a moderation challenge that it'll have to take more seriously if it wants the legitimacy it's spending big money to attain. In another corner of Alphabet's world, hundreds of Chrome extensions were caught siphoning data from people who installed them, part of a sprawling adware scheme.

Read More

CISOS PARTICIPATE IN CYBER WARGAMES TO HONE RANSOMWARE RESPONSE PLANS WITH EC-COUNCIL

Article | February 25, 2020

EC-Council, leading global information security certification body, conducted a table-top, cyber wargame among top cybersecurity executives in Tampa, Florida. The sold-out session, “CISO wargame,” included 27 senior executives from the largest managed IT service providers in the United States. The event presented the security experts with a simulated incident where an organization is hit by a ransomware attack. Participants had to work to contain the damage of the attack, which grew more complicated as the 4-hour exercise unfolded. Participants were tasked with deciding whether to pay a ransom and use ransom negotiators as well as to communicate with employees, stockholders, and the media about the breach.

Read More

Spotlight

Buckeye Business Solutions LLC

Network Applications: Network Architecture, Intranets/Extranets, Custom Applications, Server Migrations, Back-up Solutions, Tape Backups, RAID Solutions, Off-site Solutions, Power Protection. Office Networking: Centrally managed Anti-Virus, Centrally Managed patches, Shared Files & Printing, Application Services, End User Support, E-mail Solutions, Routine Service, Web Servers, Database Management

Events