Dell Technologies : Steve Visconti at Extenua and Other Security Experts At CerbAir, Cisco, Cylance, Dell, ImageWare, NetWatcher and Siemens Discuss Solutions 4-Traders


Extenua Steve Visconti, President and CEO, Extenua told us, "Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy. It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization. Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed. This is precisely why an organization or enterprise must have the most secure and hardened environments possible. Hackers and bad actors will eventually probe and eventually move on to the easier targets.

Enabling security teams to hunt for threats that evade today's defenses. BluVector


Tysons Corner, Va.--February 14, 2017--BluVector, the leader in applying supervised machine learning to detect and respond to advanced security threats at digital speed, announced its expanded operations following the completion from the recent LLR acquisition. BluVector is now positioned for rapid growth powered by new executive hires, new product enhancements and expansion into key verticals such as financial, retail and healthcare. BluVector's supervised machine learning technology allows organizations to monitor high bandwidth, globally dispersed networks for advanced threats that are consistently evading traditional security infrastructures. The technology is based on over a decade of research that inspects millions of packets per second of North-South and East-West traffic to predict, in real-time, if software and application files pose a threat to an enterprise on-premise and in the cloud. Evaluating vast collections of both benign and malicious software and applying machine learning science, BluVector is uncovering the markers and mutations of today's modern threats.

Black Hat Asia: Decentralise security, devalue cyberattacks


Rather than attempt to thwart hackers by making it costly and difficult for them to launch attacks, which will also increase costs for the defenders, a more effective strategy may be to deflat the value of successful breaches and employ a decentralised security approach. With billions of Internet of Things (IoT) devices expected to be connected to the web by end-2016, a more appropriate tactic would be required to better combat potential attacks, said Dino Dai Zovi, mobile security lead at Square, during his keynote Thursday at Black Hat Asia 2016 held in Singapore. "With IoT, there's need to decentralise trust... Having ultimate trust in all these devices will be increasingly dangerous. If we can decentralise trust, we can ensure overall safety," Zovi said, noting that distributing control and data sharing on these devices would prevent one breached device from being used as ransomware or to infect others on the same network, such as a personal home network. There also should be "an anchor of trust" tasked to provide the main layer of security, where a hardware-based mechanism would most easily facilitate this.

The TSA is failing spectacularly at cybersecurity


The report centers on the the way TSA (mis)handles security around the data management system which connects airport screening equipment to centralized servers. It's called the Security Technology Integrated Program (STIP), and TSA has been screwing it up security-wise since at least 2012. In essence, TSA employees haven't been implementing STIP properly -- that is, when they've been implementing it at all. STIP manages data from devices we see while going through security lines at airports, namely explosive detection systems, x-ray and imaging machines, and credential authentication. The bottom line is that the TSA hasn't followed DHS guidelines for managing STIP equipment, and the risks are grave, as spelled out in the report.

Australian enterprise cloud storage take-up driven by security concerns: Telsyte


Three quarters of Australian businesses are moved, or are planning to move, to cloud-based file sharing due to increased security concerns, according to research conducted by Telsyte and released by BlackBerry on Wednesday. The research -- which formed part of Telsyte's 2017 Australian Enterprise Mobility Market Study -- found that cloud storage services ranked highest among security concerns. According to those surveyed, the biggest security threats were documents shared via the cloud, which concerned 52 percent of respondents; IP loss, at 43 percent; and customer identification, at 42 percent. The study also found that 62 percent of Australian businesses are worried about risks associated with employees storing sensitive information on cloud storage devices. Foad Fadaghi, managing director at Telsyte, said that the increasing concerns about using the cloud for business are due to a number of high-profile security breaches affecting personal cloud services.