{"id":2505,"date":"2016-12-09T00:00:00","date_gmt":"2016-12-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/12\/09\/it-security-industry-news-2016-12-08\/"},"modified":"2021-12-30T11:41:28","modified_gmt":"2021-12-30T11:41:28","slug":"it-security-industry-news-2016-12-08","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/12\/09\/it-security-industry-news-2016-12-08\/","title":{"rendered":"IT Security Industry News &#8211; 2016\/12\/08"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<h2><a id=\"a_toc\" name=\"a_toc\">Table of Contents<\/a><\/h2>\n<ul>\n&nbsp; <\/p>\n<li><font color=\"darkblue\">Onapsis Joins IBM Security App Exchange Community<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Above Security and Hitachi Data Systems launch information security service offering across North America to fight cybercrime<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">5nine Software Simplifies Hyper-V Network Configuration Best Practices with New Version of Manager<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Tyco Security Launches Shooter Detection System Integration<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Big Data and Data Analytics in Homeland Security and Public Safety is Forecast to Reach $11B in 2022, according to a New Research Report from Homeland Security Research Corp.<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">OT and Australian Fintech Start-up Inamo Have Partnered to Introduce Inamo\u2019s Wearable Devices and Platform into the Australian Market<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">OpenVPN will be audited for security flaws<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">AWS tries to protect its customers from DDoS attacks with new service<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Chinese giant Tianjin Tianhai closes $6bn Ingram Micro buyout<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Google and Slack deepen partnership in the face of Microsoft Teams<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">4 top disaster recovery packages compared<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Amazon&#8217;s Giant Data Transfer Trucks Are an IT Auditor&#8217;s Worst Nightmare<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Lisa Ropple joins Jones Day&#8217;s Boston Office<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Frost &amp; Sullivan Acclaims FireEye&#8217;s Dominance of the Global Advanced Malware Sandbox Market<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">OwlDetect scans the Dark Web for stolen data<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Cloud Security Market to Cross $10 Billion by 2021: TechSci Research Report<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Cisco Talos: Zeus spawn \u201cFloki bot\u201d malware gaining use, cyber-underworld notoriety<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Cisco Signs on with Privacy Shield<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Cisco whacks its Secure Access Control System<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Symmetry and Sage Solutions Consulting to Bring World Class Security and Compliance for Mission Critical SAP Environments<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">LookingGlass Announces New Program for Managed Security Services Providers (MSSPs)<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Kenna Security Closes $15 Million Series B Funding<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Threat intelligence feeds are, at best, uneven in quality, says Microsoft<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">SANS Announces Winners of the 2016 Difference Makers Award<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Cisco ACI Partner Ecosystem Packs a Punch \u2013 65 Partners and Growing<\/font><\/li>\n<p>&nbsp; <\/p>\n<li style=\"list-style: none\"><\/li>\n<p>&nbsp; <\/p>\n<li><font color=\"darkblue\">Network Security Market: Global Industry Analysis and Forecast 2016 &#8211; 2026<\/font><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.marketwatch.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Onapsis Joins IBM Security App Exchange Community<\/b><br \/>\nBOSTON, Dec 07, 2016 (BUSINESS WIRE)&#8212;Onapsis, a global expert in business-critical application security, today announced that the Onapsis Security Platform integrates with IBM security intelligence technology to provide customers with improved visibility into their network security.<br \/>\nUtilizing QRadar to consolidate different sources of network security, this integration with the Onapsis Security Platform (OSP) will extend the existing visibility of QRadar, as well as security process and workflows to include results from OSP.<br \/>\nLeveraging QRadar\u2019s new open application programming interfaces (API), the Onapsis Security Platform allows Onapsis and IBM customers to have extended coverage for real-time monitoring and reporting of advanced tacks targeting SAP business systems.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.marketwatch.com\/story\/onapsis-joins-ibm-security-app-exchange-community-2016-12-07\">http:\/\/www.marketwatch.com\/story\/onapsis-joins-ibm-security-app-exchange-community-2016-12-07<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.channelpronetwork.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Above Security and Hitachi Data Systems launch information security service offering across North America to fight cybercrime<\/b><br \/>\nMontreal, QC and Santa Clara, CA \u2013 December 6, 2016 \u2013 Above Security \u2013 A Hitachi Group Company and global IT security service provider, and Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., today announced their partnership to deliver information security consulting services in North America.<br \/>\nThe joint service is structured around a unified governance, risk and compliance (GRC) framework that reflects a human approach.<br \/>\nBased on their combined security service capabilities, Above Security and Hitachi Data Systems tackle security issues through deeply collaborative partnerships with their customers, rather than quick-fix technology solutions that can overwhelm and confuse corporate IT teams.<br \/>\nSecurity experts from Above Security and Hitachi Data Systems work with companies to learn how they operate and how much risk they can tolerate.<br \/>\nUsing industry-leading control frameworks such as ISO and NIST, the team then assesses control maturity and gaps.<br \/>\nBased on the results, Above Security and Hitachi Data Systems provide services to defend against cybercrime and data theft, including security program reviews and designs, IT security governance consulting, risk and control assessments, PCI compliance consulting, vulnerability and application assessments and penetration testing.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.channelpronetwork.com\/news\/above-security-and-hitachi-data-systems-launch-information-security-service-offering-across\">http:\/\/www.channelpronetwork.com\/news\/above-security-and-hitachi-data-systems-launch-information-security-service-offering-across<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.sfgate.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>5nine Software Simplifies Hyper-V Network Configuration Best Practices with New Version of Manager<\/b><br \/>\n5nine Software, a Microsoft Gold Partner and the leading provider of Hyper-V security and management solutions, today released 5nine Manager v9.3.<br \/>\n5nine Manager is a centralized, GUI-based management and monitoring solution for Microsoft Hyper-V, including Server Core and Nano Server.<br \/>\nIts easy-to-use interface, powerful feature set and lightweight implementation simplify the process of managing and configuring virtualized environments.<br \/>\nThe latest version of 5nine Manager introduces the ability to create and manage Hyper-V Converged Fabric from its easy-to-use console, enabling administrators without PowerShell expertise to take advantage of this functionality.<br \/>\nNow administrators can create virtual network interface cards (vNICs), with the ability to configure bandwidth minimums, maximums and weights for Converged Fabric.<br \/>\nThey can also see a list of the host\u2019s physical adapters and their status.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.sfgate.com\/business\/press-releases\/article\/5nine-Software-Simplifies-Hyper-V-Network-10779844.php\">http:\/\/www.sfgate.com\/business\/press-releases\/article\/5nine-Software-Simplifies-Hyper-V-Network-10779844.php<\/a><\/p>\n<p><b>Tyco Security Launches Shooter Detection System Integration<\/b><br \/>\nWESTFORD, Mass. \u2014 Tyco Security Products announced that Software House C\u2022CURE 9000 now integrates with Guardian Indoor Active Shooter Detection System by Shooter Detection Systems.<br \/>\nThe Guardian Indoor Active Shooter Detection System combines an acoustic gunshot identification software with infrared camera gunfire flash detection.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.securitysales.com\/article\/tyco_security_launches_shooter_detection_system_integration\">http:\/\/www.securitysales.com\/article\/tyco_security_launches_shooter_detection_system_integration<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.einpresswire.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Big Data and Data Analytics in Homeland Security and Public Safety is Forecast to Reach $11B in 2022, according to a New Research Report from Homeland Security Research Corp.<\/b><br \/>\nThe use of Big Data and Data Analytics by Homeland Security and Public Safety organizations is on the rise, mostly because the world is becoming more digital and connected.<br \/>\nThis trend is creating new opportunities, not only for data collection and storage, but also for intelligence processing, exploitation, dissemination, and analysis.<br \/>\nBig Data and Data Analytics technologies can increase the investigative capabilities of Homeland Security and Public Safety organizations in many relevant aspects, including: war on crime &amp; terror, defense from cyber-attacks, public safety, disaster and mass incident management, and development of predictive capabilities.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.einpresswire.com\/article\/357065809\/big-data-and-data-analytics-in-homeland-security-and-public-safety-is-forecast-to-reach-11b-in-2022-according-to-a-new-research-report-from-homeland\">http:\/\/www.einpresswire.com\/article\/357065809\/big-data-and-data-analytics-in-homeland-security-and-public-safety-is-forecast-to-reach-11b-in-2022-according-to-a-new-research-report-from-homeland<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.marketwatch.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>OT and Australian Fintech Start-up Inamo Have Partnered to Introduce Inamo\u2019s Wearable Devices and Platform into the Australian Market<\/b><br \/>\nCOLOMBES, France, Dec 08, 2016 (BUSINESS WIRE)&#8212;OT (Oberthur Technologies), a leading global provider of embedded security software products, services and solutions, has today signed an agreement to provide its digital payment enablement technology to Inamo\u2019s wearable solutions, starting with the CURL which is being launched in Australia today.<br \/>\nThe CURL is a multi-functional wearable that will initially enable consumers to make payments by simply tapping their device to any point of sale terminal where Visa payWave is accepted.<br \/>\nThe action would be the same as with a credit or debit card.<br \/>\nWhat makes this different from smart phones, smart watches and other wearables is that the CURL is rugged, waterproof and will not need any power to facilitate payment.<br \/>\nSo there would be no fears of bringing it for water sports or of low battery conditions preventing payment when it is most needed.<br \/>\nIn addition to contactless payments, over the next 18 months the CURL will also be available to use for payment on public transport, building access, ticketing for festivals, and gym membership.<br \/>\nIn effect this can combine the functions of multiple products into one multi-purpose wearable device and continues the trend of device \/ technology convergence.<br \/>\nUnder the terms of the agreement, Inamo will provide a full consumer solution which will leverage its own platform and OT\u2019s next generation digital payment enablement solution.<br \/>\nThe CURL will be sold for $19.99, plus an account keeping fee of $5 per month.<br \/>\nAn initial, limited allotment of the product will be available in January; pre-orders can be made via Inamo\u2019s website at www.inamo.com.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.marketwatch.com\/story\/ot-and-australian-fintech-start-up-inamo-have-partnered-to-introduce-inamos-wearable-devices-and-platform-into-the-australian-market-2016-12-08\">http:\/\/www.marketwatch.com\/story\/ot-and-australian-fintech-start-up-inamo-have-partnered-to-introduce-inamos-wearable-devices-and-platform-into-the-australian-market-2016-12-08<\/a><\/p>\n<p><b>OpenVPN will be audited for security flaws<\/b><br \/>\n<i>Lucian Constantin<\/i><br \/>\nThe next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert.<br \/>\nThe audit will be fully funded by Private Internet Access (PIA), a popular VPN service provider that uses OpenVPN for its business.<br \/>\nThe company has contracted cryptography engineering expert Matthew Green, a professor at Johns Hopkins University in Baltimore, to carry out the evaluation with the goal of identifying any vulnerabilities in the code.<br \/>\nThe audit will be fully funded by Private Internet Access (PIA), a popular VPN service provider that uses OpenVPN for its business.<br \/>\nThe company has contracted cryptography engineering expert Matthew Green, a professor at Johns Hopkins University in Baltimore, to carry out the evaluation with the goal of identifying any vulnerabilities in the code.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.itnews.com\/article\/3148316\/security\/openvpn-will-be-audited-for-security-flaws.html?idg_eid=98c39854eed91988bc1642a456a668a1&amp;token=%23tk.ITN_nlt_ITnews_Daily_2016-12-08&amp;utm_source=Sailthru&amp;\">http:\/\/www.itnews.com\/article\/3148316\/security\/openvpn-will-be-audited-for-security-flaws.html?idg_eid=98c39854eed91988bc1642a456a668a1&amp;token=%23tk.ITN_nlt_ITnews_Daily_2016-12-08&amp;utm_source=Sailthru&amp;<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computerworld.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>AWS tries to protect its customers from DDoS attacks with new service<\/b><br \/>\n<i>Blair Hanley Frank<\/i><br \/>\nAmazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts.<br \/>\nIt&#8217;s called Shield, and the free entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday.<br \/>\nWerner Vogels, the CTO of Amazon.com, unveiled the service at AWS&#8217; re:Invent conference in Las Vegas.<br \/>\nAutomatically protecting its customers may help encourage businesses to pick Amazon&#8217;s cloud over others, or persuade businesses to migrate their web applications to the cloud.<br \/>\nIt&#8217;s also a strike against companies like Cloudflare and Akamai, which offer DDoS mitigation services.<br \/>\nShield Standard is aimed at protecting web apps from the overwhelming majority of common DDoS attacks at no extra cost. (Vogels also said that it would block volumetric attacks like NTP reflection attacks, and many state exhaustion attacks.)<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.computerworld.com\/article\/3145661\/cloud-computing\/aws-tries-to-protect-its-customers-from-ddos-attacks-with-new-service.html?idg_eid=d5d8326c323742a4ed7bf4fd3dac54c4&amp;token=%23tk.CTWNLE_nlt_\">http:\/\/www.computerworld.com\/article\/3145661\/cloud-computing\/aws-tries-to-protect-its-customers-from-ddos-attacks-with-new-service.html?idg_eid=d5d8326c323742a4ed7bf4fd3dac54c4&amp;token=%23tk.CTWNLE_nlt_<\/a><\/p>\n<p><b>Chinese giant Tianjin Tianhai closes $6bn Ingram Micro buyout<\/b><br \/>\n<i>DH Kass<\/i><br \/>\nIngram Micro has completed its $6bn sale to HNA&#8217;s Tianjin Tianhai, the companies announced today.<br \/>\nThe deal, which amounts to $38.90 per share in an all-cash transaction, produced an executive shuffle and the disbanding of Ingram&#8217;s board in favor of an entirely new board, comprised of a mixture of the distributor&#8217;s and HNA&#8217;s top execs and two independent directors.<br \/>\nAccording to an 8-K filing, Ingram Micro CFO William Humes, along with general counsel Larry Boyd will exit the distributor on 16 December, following the earlier departure of Paul Read, Ingram Micro&#8217;s former president and COO.<br \/>\nBoth Humes and Boyd will serve as new board members.<br \/>\nThe Ingram execs will be joined on the board by HNA vice chairman and CEO Adam Tan, who will serve as board chair, Alain Moni\u00e9, Ingram CEO, Bharat Bhise, president and CEO of Bravia Capital, Dale Laurance, former chairman of Ingram&#8217;s board, and Jim McGovern, former under secretary and acting secretary of the US Air Force.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.channelnomics.eu\/channelnomics-eu\/news\/3000807\/chinese-giant-tianjin-tianhai-closes-usd6bn-ingram-micro-buyout?utm_medium=email&amp;utm_campaign=CRN.Daily_RL.EU.A.U&amp;utm_source=CRN.DCM.Editors_U\">http:\/\/www.channelnomics.eu\/channelnomics-eu\/news\/3000807\/chinese-giant-tianjin-tianhai-closes-usd6bn-ingram-micro-buyout?utm_medium=email&amp;utm_campaign=CRN.Daily_RL.EU.A.U&amp;utm_source=CRN.DCM.Editors_U<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computerworld.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Google and Slack deepen partnership in the face of Microsoft Teams<\/b><br \/>\n<i>Blair Hanley Frank<\/i><br \/>\nWednesday saw the announcement of several new features aimed at making G Suite, Google\u2019s set of productivity software and services, more useful to people who use Slack.<br \/>\nThe functionality resulting from the partnership will make it easier to share and work on files stored in Google Drive using Slack.<br \/>\nIn a thoroughly modern turn, Google is building a Drive Bot, which will inform users about changes to a file, and let them approve, reject and settle comments in Slack, rather than opening Google Docs.<br \/>\nIt goes along with Slack\u2019s continuing embrace of bots as a key part of the chat service\u2019s vision of productivity.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.computerworld.com\/article\/3147881\/enterprise-applications\/google-and-slack-deepen-partnership-in-the-face-of-microsoft-teams.html?idg_eid=d5d8326c323742a4ed7bf4fd3dac54c4&amp;token=%23tk.CTWNLE\">http:\/\/www.computerworld.com\/article\/3147881\/enterprise-applications\/google-and-slack-deepen-partnership-in-the-face-of-microsoft-teams.html?idg_eid=d5d8326c323742a4ed7bf4fd3dac54c4&amp;token=%23tk.CTWNLE<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computerworld.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>4 top disaster recovery packages compared<\/b><br \/>\nFour of the top disaster-recovery (DR) software suites are Veeam Backup, Altaro VM Backup, Zerto Virtual Replication and VMware\u2019s Site Recovery Manager (SRM), according to reviews written by users in the IT Central Station community.<br \/>\nThere\u2019s arguably no more important IT task than making sure business systems and data can be restored after a disaster.<br \/>\nSo we asked system administrators to identify the best features&#8212;and what\u2019s missing&#8212;in four leading software suites for disaster recovery.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.computerworld.com\/article\/3147340\/disaster-recovery\/4-top-disaster-recovery-packages-compared.html?idg_eid=d5d8326c323742a4ed7bf4fd3dac54c4&amp;token=%23tk.CTWNLE_nlt_computerworld_dailynews_20\">http:\/\/www.computerworld.com\/article\/3147340\/disaster-recovery\/4-top-disaster-recovery-packages-compared.html?idg_eid=d5d8326c323742a4ed7bf4fd3dac54c4&amp;token=%23tk.CTWNLE_nlt_computerworld_dailynews_20<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/goingconcern.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Amazon&#8217;s Giant Data Transfer Trucks Are an IT Auditor&#8217;s Worst Nightmare<\/b><br \/>\n<i>Megan Lewczyk<\/i><br \/>\nWhat about when you run out of digital storage space.<br \/>\nOr, on a larger scale, your company decides to ditch the cost and maintenance required for their in-house data center.<br \/>\nSame logic.<br \/>\nOnce again, rent a truck and move the crap you can\u2019t bear to (or legally can\u2019t) part with off-site.<br \/>\nI don\u2019t know why the \u201crent a truck\u201d concept seems so revolutionary.<br \/>\nMaybe it\u2019s the melodramatic music and flashing lights?<br \/>\nAs with any precious cargo out for a spin, you worry about its safety.<br \/>\nThe suggested internal controls for data transfer still apply.<br \/>\nTo refresh your memory, ISACA Journal describes the key control objectives for data transfer:<br \/>\nSecurity of data being transferred is a critical component of the risk associated with data transfers.<br \/>\nThe primary objective here is to ensure that the data intended to be extracted from the originating system are exactly the same data as that recorded\/ downloaded in the recipient system, i.e., that the data were protected and secured throughout the transfer process.<br \/>\nThe secondary objective is to prevent unauthorized access to the data via interception, malicious activities and other means.<br \/>\nSo, what does happen if the truck is commandeered.<br \/>\nIt\u2019s still vulnerable even if it isn\u2019t exposed to a network during transport.<br \/>\nA data breach would be a gigantic headache for not only the company with the now compromised data but Amazon too.<br \/>\nBetter safe, than sorry.<br \/>\nSnowmobile uses multiple layers of security designed to protect your data including dedicated security personnel, GPS tracking, alarm monitoring, 24\/7 video surveillance, and an optional escort security vehicle while in transit.<br \/>\nAll data is encrypted with 256-bit encryption keys managed through the AWS Key Management Service (KMS) and designed to ensure both security and full chain-of-custody of your data.<br \/>\nLet\u2019s just hope everything goes according to plan and businesses dodge any run-ins with data theft or cyber extortion.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/goingconcern.com\/post\/amazons-giant-data-transfer-trucks-are-it-auditors-worst-nightmare\">http:\/\/goingconcern.com\/post\/amazons-giant-data-transfer-trucks-are-it-auditors-worst-nightmare<\/a><\/p>\n<p><b>Lisa Ropple joins Jones Day&#8217;s Boston Office<\/b><br \/>\nThe global law firm Jones Day has announced that Lisa M.<br \/>\nRopple has joined the Firm&#8217;s Boston Office as a partner in its Cybersecurity, Privacy &amp; Data Protection and Government Regulation practices.<br \/>\nAt Jones Day, Ms.<br \/>\nRopple will continue to assist client companies in investigating and responding to data security incidents and addressing the wide range of legal challenges they can present.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.metrocorpcounsel.com\/news\/34458\/lisa-ropple-joins-jones-days-boston-office\">http:\/\/www.metrocorpcounsel.com\/news\/34458\/lisa-ropple-joins-jones-days-boston-office<\/a><\/p>\n<p><b>Frost &amp; Sullivan Acclaims FireEye&#8217;s Dominance of the Global Advanced Malware Sandbox Market<\/b><br \/>\nMOUNTAIN VIEW, Calif., Dec. 7, 2016 \/PRNewswire\/&#8212;Based on its recent analysis of the advanced malware sandbox market, Frost &amp; Sullivan recognizes FireEye with its 2016 Global Market Leadership Award.<br \/>\nAs a pioneer of the advanced malware sandbox as a critical enterprise security solution, FireEye leveraged its first-mover advantage to claim 56% of global revenue in 2015, propelling the company&#8217;s revenue to $623.0 million for 2015, which is a year-on-year increase of 46%.<br \/>\nIts market dominance is largely due to the quality of its Threat Management Platform, which is a complete portfolio of advanced threat protection products.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.prnewswire.com\/news-releases\/frost--sullivan-acclaims-fireeyes-dominance-of-the-global-advanced-malware-sandbox-market-300374111.html\">http:\/\/www.prnewswire.com\/news-releases\/frost&#8212;sullivan-acclaims-fireeyes-dominance-of-the-global-advanced-malware-sandbox-market-300374111.html<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.finextra.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>OwlDetect scans the Dark Web for stolen data<\/b><br \/>\nOwlDetect gives you the power to scan the \u2018Dark Web\u2019 &#8211; the anonymous collection of encrypted websites most commonly used for illegal trading &#8211; for almost any piece of personal data that might have been leaked or stolen during a cyber-attack.<br \/>\nThis includes email addresses, debit or credit cards, bank details and even passport numbers.<br \/>\nAvailable as a subscription service, OwlDetect costs just \u00a33.50 per month.<br \/>\nFirst-time users will be provided with a backdated check for their information, followed by ongoing alerts if any of their personal details are found to be compromised online.<br \/>\nThe service will also offer vital advice on the steps users should take to resolve any issues found, and how to be better protected in future.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"https:\/\/www.finextra.com\/pressarticle\/67355\/owldetect-scans-the-dark-web-for-stolen-data\">https:\/\/www.finextra.com\/pressarticle\/67355\/owldetect-scans-the-dark-web-for-stolen-data<\/a><\/p>\n<p><b>Cloud Security Market to Cross $10 Billion by 2021: TechSci Research Report<\/b><br \/>\nAccording to TechSci Research report, &#8220;Global Cloud Security Market By Service Type, By Deployment Mode, By End User, By Region, Competition Forecast and Opportunities, 2011 &#8211; 2021&#8221;, global cloud security market is projected to cross $10 Billion by 2021, on account of increasing adoption of cloud computing, rising demand for managed security services, increasing smartphone user base and growing number of data breach incidents.<br \/>\nFurther, number of internet users across the globe stood at 3.14 billion in 2015 and this is estimated to reach 3.29 billion by 2016.<br \/>\nThis has fueled need for virtual storage infrastructure such as cloud.<br \/>\nMoreover, in 2015, number of smartphone users across the globe stood at 1.89 billion and is estimated to reach 2.12 billion by 2016.<br \/>\nIT &amp; telecom witnessed an increase in the number of cyber attacks and data breaches incidents aimed at gaining access to financial data, identity theft, etc.<br \/>\nDue to such instances IT &amp; telecom companies across the globe are focusing on adoption of cloud security services.<br \/>\nAdditionally, growing e-commerce industry, emergence of various e-commerce mobile applications and growing tie-ups of various advertising companies, etc., is increasing data security breaches.<br \/>\nFurther, growth in ecommerce sector is generating large volumes of data and this is fueling use of cloud infrastructure for storage of this data.<br \/>\nThus, retail companies are adopting cloud security solutions to safeguard data from hackers and this is projected to propel demand for cloud security solutions from various end user industries across the globe during the forecast period.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.prnewswire.com\/news-releases\/cloud-security-market-to-cross-10-billion-by-2021-techsci-research-report-605231166.html\">http:\/\/www.prnewswire.com\/news-releases\/cloud-security-market-to-cross-10-billion-by-2021-techsci-research-report-605231166.html<\/a><\/p>\n<p><b>Cisco Talos: Zeus spawn \u201cFloki bot\u201d malware gaining use, cyber-underworld notoriety<\/b><br \/>\n<i>Michael Cooney<\/i><br \/>\nCisco\u2019s Talos security group this week warned that a variant of trojan monster Zeus has begun to garner a following in the cyber-underworld as a hard-to-detect attack mechanism.<br \/>\n\u201c[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011.<br \/>\nRather than simply copying the features that were present within the Zeus trojan \u2018as-is\u2019, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,\u201d Talos wrote.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.networkworld.com\/article\/3148785\/security\/cisco-talos-zeus-spawn-floki-bot-malware-gaining-use-cyber-underworld-notoriety.html\">http:\/\/www.networkworld.com\/article\/3148785\/security\/cisco-talos-zeus-spawn-floki-bot-malware-gaining-use-cyber-underworld-notoriety.html<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.cisco.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Cisco Signs on with Privacy Shield<\/b><br \/>\n<i>Michelle Dennedy<\/i><br \/>\nCisco supports protecting and enabling the international flow of personal data that furthers a progressive economy.<br \/>\nTo that end, we received official word that we are loud, proud, and on the list for the Privacy Shield \u2013 the voluntary, self-certification framework for EU-US data transfer.<br \/>\nWhy is Cisco participating.<br \/>\nIsn\u2019t Privacy Shield being challenged along with the rest of the data transfer mechanisms.<br \/>\nAlthough there have been challenges testing the effectiveness of our transatlantic partnership, we have seen that data privacy matters to Cisco employees and customers.<br \/>\nPrivacy is the authorized processing of personally identifiable information according to moral, legal, ethical, and sustainable fair principles.<br \/>\nPrivacy Shield provides EU-like data protection for personal data processed in the United States.<br \/>\nComplying with Privacy Shield signals that Cisco takes privacy concerns very seriously, because it is the right thing to do for individuals and businesses.<br \/>\nUltimately, it drives trust in business and confidence with regulators and citizens alike, which is good for Cisco and our customers.<br \/>\nSo, we signed up and will keep striving to make our products and processes even better every day.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/blogs.cisco.com\/security\/cisco-signs-on-with-privacy-shield\">http:\/\/blogs.cisco.com\/security\/cisco-signs-on-with-privacy-shield<\/a><\/p>\n<p><b>Cisco whacks its Secure Access Control System<\/b><br \/>\n<i>Michael Cooney<\/i><br \/>\nCisco this week this week announced the death of its Secure Access Control System \u2013 a package customers use to manage access to network resources.<br \/>\nCisco said the last day customers can order the system is August 30, 2017.<br \/>\nFor customers with active and paid service and support contracts, support will be available under the terms and conditions of customers&#8217; service contract the company said.<br \/>\nThe last date that Cisco Engineering will release any final software maintenance releases or bug fixes is Aug. 30, 2018.<br \/>\nAfter this date, Cisco Engineering will no longer develop, repair, maintain, or test the product software, the company said.<br \/>\n\u201cThe Cisco Secure Access Control System (ACS) product functionality has been implemented in the Cisco Identity Services Engine (ISE) product line.<br \/>\nCustomers with only Access Control System installations interested in migrating to ISE may purchase a migration bundle with product part number ACS-ISE-MIG-M or ACS-ISE-MIG-S, on sale until August 31, 2017.<br \/>\nCustomers who have maintained parallel installations of both ACS and ISE are able to simplify their security solution by using the functionality of their ISE installment.<br \/>\nCustomers with both ACS and ISE installations are not eligible for the migration bundles,\u201d Cisco wrote in an announcement of the product\u2019s end of life.<br \/>\n<font color=\"blue\"><b>Link:<\/b><\/font> <a href=\"http:\/\/www.networkworld.com\/article\/3147842\/cisco-subnet\/cisco-whacks-its-secure-access-control-system.html\">http:\/\/www.networkworld.com\/article\/3147842\/cisco-subnet\/cisco-whacks-its-secure-access-control-system.html<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sports.yahoo.com\/favicon.ico\" width=\"16\" height=\"16\" \/> <b>Symmetry and Sage Solutions Consulting to Bring World Class Security and Compliance for Mission Critical SAP Environments<\/b><br \/>\nJACKSONVILLE, FL and MILWAUKEE, WI&#8212;(Marketwired &#8211; Dec 7, 2016) &#8211; Responding to continued market demand for comprehensive SAP security and audit readiness services, Sage Solutions Consulting, an SAP c<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2505","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2505"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2505\/revisions"}],"predecessor-version":[{"id":4992,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2505\/revisions\/4992"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}