Cybersecurity and threat news for Europe, the Middle East & Africa
Gartner names newcomer Exabeam a leader in SIEM
The vendor landscape for SIEM is evolving, with recent entrants bringing technologies optimised for analytics use cases.
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t.
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
A10 Networks outlines 5G strategy
A10 has production and pilot 5G deployments with carriers worldwide, and is working with others to plan for their future 5G initiatives.
Microservices firewall firm Alcide raises $7m for expansion
An Israel-based cybersecurity firm has raised $7 million in Series A funding just seven months after launching its platform.
Is your SD-WAN solution leaving you vulnerable?
Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.
Modernising ERP systems can help organisations comply with GDPR
“Organisations need to look for modern ERP systems that are specifically designed with GDPR in mind."
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
500 million impacted by Marriott database breach
A root cause of the breach is currently unknown, but Marriott indicated that the intruders encrypted the information before exfiltrating the data.
Whitepaper: How to protect your business from insider threats
Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world.
Whitepaper: The evolution of physical access control
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
ForgeRock updates multicloud identity management solution
Organisations today need to maintain an identity platform that enables both friction-free and highly-secure authentication.
A clear case for AI in endpoint protection
Today, AV has an alternative, and it is Artificial Intelligence (AI).
Check Point announces general availability for CloudGuard SaaS
CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
GDPR and backup – balancing business continuity and data protection
It’s over six months since the implementation of the General Data Protection Regulation (GDPR) and we’re now at the in-between phase. T
3 key points to securing your digital transformation journey
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
HID Global brings high authentication to mobile
The company’s new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Quora's been breached: Users, change your passwords
Quora’s 100 million users are the latest targets in a major data breach, but at least the company has moved quickly to contain it.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
How to mitigate and manage open source risks
"If organisations are going to benefit from using open source components, they need to use the right tools to keep their product and customers safe from hackers."
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Carbon Black adds MITRE ATT&CK feeds to security products
The new threat feeds map directly to the various attack tactics outlined by MITRE.
GDPR compliance: A step-by-step guide
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Whitepaper: The 2018 Unisys security index
Globally security concerns among individuals continue to hold at the highest level ever recorded.
What the people say - Gartner’s November Customers’ Choices
A roundup of the latest Gartner Peer Insight Customers’ Choices from Backup and Recovery to Business Intelligence and Analytics, and more.
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
Gemalto building EU data centres to satiate GDPR
The company is looking to put its shoes in line for the EU’s General Data Protection Regulation (GDPR).
Three key steps to improving security patching
Many IT departments only patch the top software applications such as Microsoft, Adobe and their browsers.
NeuVector adds additional features to Kubernetes security platform
NeuVector, which also offers next-generation container firewall, says the additions will stop vulnerable images from deploying into Kubernetes production environments.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Amazon customers irate after 'technical error'
Amazon isn't providing enough details about the error - and customers aren't happy.
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
AWS makes building and securing data lakes easier
AWS Control Tower, AWS Security Hub, and AWS Lake Formation help with provisioning and governance, monitoring security and compliance, and building and managing data lakes.
Gartner names Zscaler leader in secure web gateways
“The market for cloud-based secure web gateway (SWG) services continues to grow more quickly than the market for appliance-based SWGs.”
EU to roll out digital lie detectors at border security checkpoints
Travellers through Hungary, Greece and Latvia may soon encounter a lie detector when they try to cross the border.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
Sophos XG Firewall adds lateral movement protection
The new capabilities will help to prevent targeted, manual cyber attacks and exploits from further infiltrating a compromised network.
Uber disguised breach ransom payment as a bug bounty reward
“Paying the attackers and then keeping quiet about it afterwards was not, in our view, an appropriate response to the cyber attack."
BlackBerry buys out cybersecurity AI firm Cylance
“We are eager to leverage BlackBerry’s mobility and security strengths to adapt our advanced AI technology to deliver a single platform.”
Whitepaper: Mobility you can trust
Mobility gives hackers additional opportunities to gain access to your company’s sensitive data, thus your highly confidential information is at risk.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Singtel integrates cybersecurity capabilities under Trustwave banner
The integration enables Trustwave to harness the synergies of Singtel’s global cybersecurity business, revenue, capabilities across the Americas, Europe and Asia Pacific.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
Europol cracks down on counterfeit sites; arrests 12 people
“This is a result of Europol’s comprehensive approach to make the internet a safer place for consumers."
AWS announces two new Marketplace features
Now customers and marketplace sellers have the ability to use a private marketplace, as well as a dedicated marketplace for containers.
Why e-commerce needs DDoS protection for Cyber Monday
DDoS attacks can cripple an organisation, a network or even a country and recent attacks have been larger and more complex than ever.
The potential of secure data storage and analytics
According to a recent study, the data industry still has a lot of untapped potential.
Dell.com customers urged to change passwords after breach
Dell is asking all of its Dell.com customers to change their passwords after it detected ‘unauthorised activity’ on its network earlier this month.
Why encryption causes DDoS defence headaches
Some forms of encryption technology can make identifying and blocking some threats more difficult.
Microsoft comments on recent tech support scam crackdowns
Despite the crackdowns, Microsoft warns that these scams persist and target everyone, no matter their age or location.
Why digital trust is crucial for your digital transformation
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Phishing: It's all too easy on mobile devices
A single errant tap moves an attacker closer to your data.
Whitepaper: Three changes that will make security teams more effective
Organisations are spending more and more money on cybersecurity preventive measures, yet the breaches seem to keep increasing.