Cyber Security Institute


Friday, August 30, 2013

Tenable Launches Security “App Store” For SecurityCenter 4.7

Tenable Network Security, the leader in real-time vulnerability management, today announced SecurityCenter 4.7&trade. With this release, Tenable introduces a first-of-its-kind security “app store” – a catalog of hundreds of apps created by Tenable researchers that provide the latest intelligence for identifying advanced threats and compliance violations.


Friday, July 19, 2013

HP Updates ArcSight Portfolio With Security Analytics

Technology giant Hewlett-Packard (HP) announced updates to its ArcSight portfolio, offering enterprises unified security analytics for big data with expanded identity monitoring to accelerate the detection of persistent threats. The series of updates includes ArcSight Threat Detector 2.0, which offers threat profiles and threat profile intelligence, and ArcSight Threat Response Manager 5.5, which provides cloud-ready, closed-loop capabilities for accelerated threat detection and response to mitigate advanced persistent threats (APTs).



Wednesday, July 17, 2013

Security company to release testing tool for SAP mobile access

As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers. Boston-based Onapsis will release a new module for its X1 security suite, a product that performs automated security assessments, penetration testing and compliance audits for SAP’s ERP (enterprise resource planning) software, said Mariano Nunez, Onapsis’ CEO. The module will focus in part on the SAP Mobile Platform, formerly known as the Sybase Unwired Platform Developer Center, which helps developers build SAP mobile applications for different devices and platforms.



Tuesday, June 25, 2013

Unified database security software to help prevent intrusions

Cloud-service providers, database-hosting companies, large enterprises and small service providers can deploy unified database security software to prevent intrusions and Structured Query Language (SQL) injection attacks into databases, says Israeli database security company GreenSQL founder and CTO David Maman. The company’s unified database security software parses the protocols and the syntax of connections into a database and analyses the patterns of activity to monitor and manage access to sensitive information. “GreenSQL’s Database Activity Monitoring enables management to see exactly when and which sensitive records their external consultants have been exposed to and what actions they took.”


Friday, May 24, 2013

CommonKey Brings Password Management To Small Teams

Instead of focusing only on the needs of the individual user or offering a complex solution for the enterprise, it provides a password management system which allows small businesses the ability to share passwords securely across a team. The bootstrapped, Baltimore-based startup was co-founded this October by Andrew Stroup, a civilian engineer who currently works at the Department of Defense, and Michael Cohen, whose programming background is in the medical sector.


Monday, May 20, 2013

New Security Intelligence Solution, EnCase® Analytics, Unveiled by Guidance Software

  Guidance Software (NASDAQ: GUID), the World Leader in Digital Investigations™, today announced EnCase® Analytics, a complete security intelligence solution that leverages endpoint analytics to produce a clear picture of security risk and exposure to unknown threats. EnCase Analytics focuses on the endpoints (end-user devices and servers) – the targets of threats and where they ultimately hide – and assesses risks and threats with a bird’s-eye view of the activity of every endpoint and server, enterprise-wide. “For those of us on the front-line responsible for catching new, hard-to-detect security threats that bypass the perimeter, time to detection is very important,” said Colby Clark, director of Incident Management for FishNet Security. EnCase Analytics addresses this challenge by delivering a complete security intelligence solution that collects the appropriate data from the enterprise endpoints, assembles it in a security-oriented data structure, and through the use of pre-built and ad-hoc intuitive reports, provides the security analyst with deep insights into lurking threats.


Tuesday, April 30, 2013

Splunk Adds Statistical Analysis to Enterprise Security App

Analysis of machine-generated data can play an important role in a sophisticated layered defense for your data and systems, but getting there can be challenging even with advanced intelligence platforms. Splunk—provider of an engine that collects, indexes and analyzes massive volumes of machine-generated data—is out to change that with today’s release of version 2.4 of the Splunk App for Enterprise Security, which makes the statistical analysis tools, dashboards and visualizations available out of the box. “Statistical analysis is the new weapon of the security warrior defending against threats that bypass traditional security detection systems,” says Mark Seward, senior director of security and compliance at Splunk.


A New Source of Cyberthreat Updates

The FS-ISAC is now offering briefings on the latest trends and how to address them, says Bill Nelson, president. Through a new partnership with the cyber-intelligence firm iSIGHT Partners, the Financial Services Information Sharing and Analysis Center is providing its banking institution members with updates on cyber-attack trends, including data from international markets, says Nelson, FS-ISAC president. “iSIGHT is now providing briefings to our members about how these attacks can be detected and, in some cases, mitigated,” Nelson says during an interview with Information Security Media Group.



Friday, April 26, 2013

Kingston adds malware scanner to its secure drives

Then there was a bit of a backlash in government circles, with some agencies gluing their USB ports closed to prevent unauthorized devices from connecting because the drives offer a window for malware to enter networks.   In recent years removable media has been at the center of major security events, as a vehicle of infection for the infamous Stuxnet worm and as a data exfiltration vector associated with the Flame virus. The combination extends ClevX DriveSecurity powered by ESET’s proactive portable anti-malware technology to Kingston’s DataTraveler 4000 and DataTraveler Vault Privacy secure USB flash drives.



Monday, April 22, 2013

BAE Systems Detica unveils CyberReveal security alert service for private firms

BAE Systems Detica has launched what it calls a defence-grade cyber security product, CyberReveal, to the commercial marketplace for the first time, targeting large financial services (FS), retail and other customers with their own internal security analysts.   It can also be used as a managed services product to alert smaller firms about impending security threats if they have the money to afford on-going fees and prefer this model to an upfront capital expenditure.


Wednesday, March 27, 2013

AWS Launches CloudHSM App To Bolster Data Security In The Cloud

In an effort to boost data security in the cloud, Amazon Web Services (AWS) has just launched a new service called AWS CloudHSM, designed to help its customers meet strict regulatory requirements without sacrificing their cloud application’s performance. AWS says that the new security feature is aimed at customers whose regulatory requirements prevent them from running apps on shared infrastructure, which has been one of the key hurdles in the way of its efforts to win over the enterprise.


Monday, February 25, 2013

New RSA Solutions To Help Bring Faster Incident Response That’s Better Aligned to Business Risk

The newly released RSA(®) Advanced Incident Management for Security (AIMS), RSA(®) Asset Criticality Intelligence (ACI) and RSA(®) Data Discovery for Security Analytics software solutions are designed to provide organizations with deep context and content awareness of IT assets to help security analysts prioritize and focus threat and incident management. The combination of these solutions with the RSA Security Analytics platform is engineered to provide unmatched solution breadth and depth and helps enable organizations to become more proactive, targeted and effective in critical asset protection, threat detection and incident response.


The security threat of evasive malware

Lastline has released a new report that looks at how malware authors are able to exploit the limited visibility of automated malware analysis systems (sandboxes) and ensure that targeted attacks and zero day exploits remain successful. While environmental checks have been well documented, stalling code is the latest technique being utilized to spread malware.  It delays the execution of a malicious code inside a sandbox and instead performs a computation that appears legitimate.


Sourcefire anti-malware appliance aims to stop APTs in their tracks

The AMP appliance is built on the firm’s FirePower platform, and is designed to add further continuous file analysis, retrospective security, malware detection and blocking features. Sourcefire claimed the tool does this by adding forensic fingerprints to files that can be used to track file movements and identify the targets of advanced attacks. This network collates and shares information about known malware between the company’s clients to offer a fast alert and cyber response service. Sourcefire claimed the network is connected to millions of end points, making it one of the most comprehensive security information services in the world.


Next-Generation Threat Protection From FireEye

FireEye®, Inc., the leader in stopping today’s new breed of cyber attacks, today announced its threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks.The FireEye platform creates a cross-enterprise threat protection fabric using a next-generation threat detection engine, dynamic threat intelligence, and interoperability with a broad ecosystem of more than two dozen technology alliance partners to secure all major threat vectors and enable rapid detection, validation, and response to cyber attacks. 


Wednesday, February 20, 2013

Radware to Present at 2013 RSA Conference: Stock Exchanges in the Line of Fire - Morphology of Cyber

Radware® (NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, announces it will discuss several real-life cyber attacks on stock exchanges, during a presentation which is being held at the 2013 RSA Conference, February 25 to March 1st, in San Francisco, California.  In a presentation titled, Stock Exchanges in the Line of Fire - Morphology of Cyber-Attacks, Ziv Gadot, Radware’s Security Operations Center (SOC) team leader, will discuss how stock exchanges are constantly targeted by cyber attacks and why they are an ideal target for hacktivists who try to cause even the slightest service disruption, which may result in heavy financial losses and penalties to the financial sector.


Wombat Launches SmishGuru to Combat Phishing Attacks

Cyber-security software developer Wombat Security Technologies announced the launch of SmishGuru, a simulated attack service to target the growing problem of text-message phishing, also known as “smishing.” An expansion of the company’s family of social engineering assessment products, SmishGuru can also help companies mitigate bring-your-own-device (BYOD) risks by teaching employees to defend against popular mobile device attacks and training how to recognize and avoid the more subtle smishing attacks. Similar to Wombat’s PhishGuru and USBGuru solutions, security officers can select and customize the type of attack they want to send and select and customize the training the employee will receive if they fall for the simulated attack.


Tuesday, February 19, 2013

Antibot: Network-based botnet removal tool

ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, using them to commit large-scale click fraud and Bitcoin (a digital currency) mining.  Zeus, which is also a banking trojan, causes millions of dollars in loss to its victims by siphoning money from their online bank accounts. F-Secure Antibot disinfects devices that are infected on a network by guiding the users through a simple self-cleaning process, cutting out the need to call the operator helpdesk. “Anywhere from 6% to 20% of people, depending on the study, still don’t use antivirus software,” says Mikko Hypponen, Chief Research Officer at F-Secure.


Thursday, January 31, 2013

RSA combines SIEM with incident visibility to create Security Analytics

The new capabilities include leveraging the power of Big Data to provide visibility and context required to help identify and defend against advanced security challenges and sophisticated threats, according to the company.  Richard Nichols, regional sales director for UK and Ireland at RSA, told SC Magazine that Security Analytics is engineered to enable the discovery of risks as they occur and is a technology that allows users to do security monitoring, incident investigation and management. RSA said that the concept combines security incident and event management data with analytics to give users one tool for visibility.  Nichols said: “We have taken the best of NetWitness and combined it with the RSA enVision platform, so it is about log collection and compliance.”


F5 Networks introduces application delivery firewall

When deployed with F5’s new VIPRION 4800 hardware, the F5 application delivery firewall solution provides performance levels well beyond what other vendors can offer. By consolidating the network and security functions of several BIG-IP modules into an integrated solution, F5 helps organizations reduce management complexity and overhead, while maintaining superior performance and scalability.  At the core of F5’s application delivery firewall solution, the BIG-IP Advanced Firewall Manager product is an innovative network firewall built on full-proxy architecture to provide outstanding security. ...  This application-centric security model leverages F5’s industry-leading application delivery capabilities and intelligence to enhance customers’ overall security posture, while alleviating the complexity associated with mapping application infrastructure to static constructs such as traditional firewall zones.


Tuesday, January 29, 2013

Cisco to buy Czech vendor Cognitive Security for real-time analytics | ITworld

Cisco plans to acquire Cognitive Security, a security software company that uses real-time behavioral analysis to detect security threats. Together, the technologies will work with a common policy engine built into networks, with distributed enforcement, according to a Cisco blog post.


Solera Networks Becomes Industry’s First Security Intelligence and Analytics Solution with Common Cr

Solera Networks, the industry’s leading Big Data Security Intelligence and Analytics provider, today announced that Solera DeepSee Software and Solera DeepSee Central Manager have been awarded Common Criteria Evaluation Assurance Level 3+ certification.  Common Criteria certification is recognized in over 25 countries as a critical validation of security technology, and will make the Solera DeepSee Platform more accessible to federal agencies and commercial enterprises. It also assures commercial businesses that a product has been certified as meeting a standard measure of security, whether it is used internally or in solutions for customers. ...  Solera DeepSee Software and Solera DeepSee Central Manager were evaluated under the terms and conditions of the Common Criteria Scheme and were certified to comply with the requirements for EAL 3+ Common Criteria Assurance Level.


Monday, February 27, 2012


SourceFire announced the first Next-Generation Intrusion Prevention System (NGIPS) to provide fully integrated and intelligent application control. Sourcefire, which pioneered NGIPS in 2003, is extending its Agile Security™ vision by providing the world’s first NGIPS to incorporate real-time contextual awareness and full-stack visibility, together with intelligent security automation and granular application control.


Thursday, February 09, 2012

Splunk Launches Splunk App for Enterprise Security 2.0

Splunk today announced the general availability of its Enterprise Security Intelligence Solution, consisting of the Splunk App for Enterprise Security 2.0, and Splunk® Enterprise™ 4.3, the company’s flagship software for collecting, indexing and harnessing machine data.


Friday, May 06, 2011

Symantec Announces Updates to Data Management, Protection and Endpoint Security Solutions

Symantec, at its Vision user conference that took place in Las Vegas this week, announced a series of updates to some of its core product offerings, spanning across its Endpoint Protection solutions to Enterprise Vault Archiving Software.  Symantec Endpoint Protection Small Business Edition 12, also available as a public beta, and it will offer small organizations with limited IT staff and resources a solution they can easily deploy.  In addition to the Endpoint Protection and Protection Center announcements, Symantec announced Symantec Enterprise Vault 10, Enterprise, and Cloud Storage for Enterprise Vault to help organizations manage and discover their information with speed, efficiency and scale, on-premise and in the cloud.


Monday, October 18, 2010

Entry level SIEM and log management solution introduced by LogLogic, as LogRhythm introduces virtual

LogLogic has announced the release of an entry-level security information event management (SIEM) and log management product.  According to LogLogic, it comes standard with support for over 340 systems and device types, and support for countless others, with the addition of LogLogic 5’s ‘Log Labels’ feature.  With support for VMware ESX, Microsoft Hyper-V and Citrix XenServer, LogRhythm said that the solution allows customers to run its platform on a virtual machine, deploy it in its familiar appliance form factor and implement mixed mode environments to meet data centre and remote site requirements.


Tuesday, October 12, 2010

LogLogic Releases Industry’s First Full Service Virtual SIEM Appliance

LogLogic, the leading independent SIEM and IT data management provider, today announced the release of the industry’s first full-service virtual SIEM solution.  Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the functionality of LogLogic’s hardware-based appliances via VMware technology, enabling companies to improve business operations, enhance security and meet strict compliance mandates.


Symantec adds service-level templates to Storage Foundation

Symantec Corp. today announced Veritas Operations Manager 3.1 and Veritas Storage Foundation High Availability 5.1, the company’s next generation family of storage management software.  Symantec said it has added “storage templates” or service levels that allow administrators to automate the type of storage—based on performance and protection level—allocated to applications.  Symantec has defined three templates of storage: Gold, Silver and Bronze, each of which is used to determine the type of disk, RAID level and whether storage is allocated through thin provisioning or through more typical common over-allocation methods.  For example, if an administrator sets a policy that all e-mail that does not contain company sensitive financial information is to receive Bronze-level storage, it might be stored on serial ATA (SATA) drives on a network-attached storage (NAS) system with RAID 6 protection.


Friday, August 20, 2010

WAN Log File Data Collection Heads for Standardization

The upcoming LogLogic 5 release from log vendor LogLogic is aiming to expand that visibility with a universal collection framework for disparate log data coming across a WAN.  Specifically, LogLogic is working to create a new standard protocol for log data transmission that could change the way enterprise collect and analyze that data.


Monday, June 07, 2010

IBM Announces New Offerings to Help Organizations Drive Innovation While Managing Cost and Risk

At the INNOVATE 2010 conference, IBM announced new software and services that help customers design and deliver the advanced products leading the convergence of mechanical, electronic, and digital technologies.  The convergence of physical assets and IT applications requires a new “systems of systems” approach for integrating products and services.  Software-driven innovation across product lines is often challenging if not supported by effective planning, development and collaboration.  Best-in-class product and service companies are those that build a strong competency in systems engineering and software development.  Organizations of the future—along with their partners and customers—must build the competencies to design, deliver and manage products in smarter ways.