Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Security Industry News – 2016-07-10

Posted on July 11, 2016December 30, 2021 by admini

Table of Contents

  • Novosco buys UK IT security services firm NetDef
  • Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report
  • Thai companies beef up security as malware threats evolve
  • Kaspersky ATM security solution promises big malware defense in a small package
  • Cybersecurity firms step up intel sharing despite issues of trust
  • Skyport interacts with Cisco ACI
  • European tech investors spot safe havens from Brexit worries
  • Why FireEye Is A Toxic Investment
  • UPDATED: Michael Yell joins RSA

Novosco buys UK IT security services firm NetDef

UK IT security solutions and managed services company NetDef has been acquired by Irish cloud provider Novosco for a 7-figure sum.
The deal will expand Novosco's workforce to 140 and expand its UK business.
Link: http://www.telecompaper.com/news/novosco-buys-uk-it-security-services-firm-netdef–1152320

Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report

PHOENIX–(BUSINESS WIRE)–BeyondTrust,
the leading cyber security company dedicated to preventing privilege
abuse and stopping unauthorized access, today announced it has been
named a Leader in The Forrester WaveTM: Privileged Identity
Management, Q3 2016 report.
According to The Forrester Wave, BeyondTrust
excels with its privileged session management capabilities.
Link: http://tucson.com/business/independent-research-firm-cites-beyondtrust-as-a-leader-in-privileged/article_da699be3-f0ae-541e-907a-b1f62a430533.html

Thai companies beef up security as malware threats evolve

Spending on computer security in Thailand is expected to resume double-digit growth this year, fuelled by the growing sophistication of malware threats and development of the digital economy and the national e-payment system, says a security software firm.
The surge follows high-single-digit growth in 2015.
No raw figures are available on computer security spending.
Khongsak Kortrakul, senior manager for technical service at Trend Micro (Thailand), said the growth of malware threats is boosting demand for automated data protection software.
Companies in Thailand experience about 10 malware incidents a month, with medium-sized enterprises heavily targeted.
Link: http://www.thestar.com.my/tech/tech-news/2016/07/08/companies-beef-up-security-as-malware-threats-evolve/

Kaspersky ATM security solution promises big malware defense in a small package

Kaspersky Lab recently announced the availability of Kaspersky Embedded Systems Security, a targeted enterprise-grade solution designed to defend ATMs, point-of-sale systems and point-of-service machines against malware attacks.
The solution works to protect a variety of Windows-based platforms that handle sensitive financial operations, a press release said.
The solution supports Windows versions from XP up to and including Windows XP Embedded, Windows Embedded 8.0 Standard and Windows 10 IoT.
Additionally, it can run on systems with as little as 256 megabytes of memory and just 50 megabytes of available disk space, Kaspersky said.
Link: http://www.atmmarketplace.com/news/kaspersky-atm-security-solution-promises-big-malware-defense-in-a-small-package/

Cybersecurity firms step up intel sharing despite issues of trust

“We have to win this war together,” said Ben Johnson, chief security strategist of Carbon Black.
The company is the latest to help pool together security expertise with a new platform called the Detection eXchange.
In 2014, Palo Alto Networks joined with rivals including Fortinet, Intel Security and Symantec to form the Cyber Threat Alliance.
The vendors are each sharing around 1,000 malware samples each day and using that data to bolster their security products.
The alliance is still small, with only about eight members, but Howard believes it will be a “game changer” if the group can expand to 50.
The intelligence sharing fills gaps in what each security vendor knows.
For instance, Palo Alto Networks and Symantec overlap in only about 70 percent of the malware intelligence they share, according to Howard.
A major fear is that information shared about vulnerabilities or a company's infrastructure may be leaked accidentally to other hackers.
But the pros can outweigh the cons.
Companies Wright has talked to see the benefits of wider collaboration and even expect it from their vendor.
They realize they’re walking a fine line between the risk of sharing too much and potentially stopping the next cyber attack.
Link: http://www.pcworld.com/article/3093477/cybersecurity-firms-step-up-intel-sharing-despite-issues-of-trust.html

Skyport interacts with Cisco ACI

Skyport's SkySecure converged system brings together zero trust compute, virtualization and a full stack of security technologies.
It logs all traffic at a forensically auditable level, enabling users to see where traffic originates, where it is headed, whether it was allowed or not, what policy allowed or blocked it, and when and who put that policy into action.
Remote management capability allows users to easily secure branch infrastructure without firewalls, proxies, MPLS or other security measures.
Link: http://www.convergedigest.com/2016/07/skyport-interoperates-with-cisco-aci.html

European tech investors spot safe havens from Brexit worries

Technology investors seeking refuge after Brexit are picking companies delivering instant access to services for Web and mobile customers or firms mainly doing business globally which can benefit from the pound's fall.
They are shying away from hardware makers or e-commerce suppliers with sizeable UK sales, which count for less after currency swings driven by Britain's vote to leave the EU.
Shareholders are also wary of software and services firms getting caught short by budget freezes by customers scrambling to reassess their businesses and resulting slowing economic growth.
Two UK-based safe havens are ARM Holdings (ARM.L), which licenses chip technology used in most smartphones worldwide, and Sophos (SOPH.L), driven by demand for its computer security software and services, most financial analysts say.
U.S. names like Salesforce.com (CRM.N) and Red Hat (RHT.N), with long-term subscriptions for Internet-delivered software and little direct exposure to Britain, are safe bets, said Silicon Valley-based analyst Trip Chowdhry.
Amazon.com (AMZN.O) and Apple (AAPL.O), while active in Britain, enjoy strong brands and have sticky subscription business models likely to insulate them from any UK slowdown, he said.
Link: http://www.reuters.com/article/us-britain-eu-tech-results-idUSKCN0ZQ0F2

Why FireEye Is A Toxic Investment

FireEye investors who have bought the stock in the hopes of an acquisition should consider selling their holdings as none will buy out the company at its asking valuation.
FireEye has removed its CEO who used to specialize in selling several emerging companies and was spearheading companies like McAfee and Documentum when they were acquired.
No buyer will pay a premium for FireEye as its expenses have been rising at a faster pace than the revenue, while the debt is also substantial.
Due to a rapid growth in expenses, FireEye's operating cash flow has slipped deep into the red, which is why no buyer might pay its $30/share asking price.
FireEye has made a mistake by not accepting two buyout offers this year, while the management shake-up indicates that the board does not intend to sell the company.
With expenses increasing at a faster rate than revenue, FireEye's business model is currently unsustainable.
Clearly, the company is bleeding money and will continue to do so as the trend above suggests.
In my opinion, an acquisition would have been the best possible outcome.
However, due to the reasons mentioned above, the chances of the company getting acquired at $30 per share are next to zero now.
Hence, I think investors should stay away from the stock.
Link: http://seekingalpha.com/article/3987377-fireeye-toxic-investment#alt2

UPDATED: Michael Yell joins RSA

Security vendor RSA has appointed a new head of channels and alliances for Asia Pacific and Japan, naming former TeleSign executive Michael Yell to the role.
Yell joined the company as of June 2016 and will be based at RSA’s Sydney offices.
The company has recently moved a number of APJ roles to Sydney including channel, inside sales, business unit leads and marketing.
As part of the role, Yell will be charged with implementing regional channel strategy in the region and managing the company’s partner base.
Link: http://www.arnnet.com.au/article/603160/michael-yell-joins-rsa/

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme