Vous êtes ici :   Accueil » RSS - net-security.org
 
Prévisualiser...  Imprimer...  Imprimer la page...
!Introduction
Technique
Outils
Base de connaissances
Visites

 1653567 visiteurs

 3 visiteurs en ligne

Contact

Notre site
griessenconsulting-Tag-Qrcode.png

info@griessenconsulting.ch

ch.linkedin.com/in/thierrygriessenCISA

Neuchâtel, Suisse


Mes coordonées
griessenconsulting-Tag-Vcard-OK.png

Crée votre Code

RSS - net-security.org

Help Net Security


Daily information security news with a focus on enterprise security.


AttackIQ automates the evaluation of Microsoft Defender ATP  Voir?

AttackIQ, a leader in the continuous security validation market to help organizations achieve cyber resiliency, announced the integration of its AttackIQ Platform with Microsoft Defender Advanced Threat Protection (ATP) to help joint customers and prospects validate the configuration and security coverage provided by the most widely deployed operating system in the world. In addition to the integration, AttackIQ is helping to validate Microsoft Defender ATP in Microsoft’s pre-sales engagements on account of AttackIQ’s differentiated open … More

The post AttackIQ automates the evaluation of Microsoft Defender ATP appeared first on Help Net Security.

... / ... Lire la suite

(23/08/2019 @ 02:30)

SafeGuard Cyber can now secure conversations in WeChat  Voir?

SafeGuard Cyber, the leading end-to-end platform for social media and digital risk protection, announced a new capability to secure conversations in WeChat, making it one of the only entities to provide security and real-time compliance protection for businesses that use the mobile messaging application. WeChat now has more than one billion daily active users, approximately 80 percent of whom use it for business purposes. Western companies have found WeChat to be a de facto requirement … More

The post SafeGuard Cyber can now secure conversations in WeChat appeared first on Help Net Security.

... / ... Lire la suite

(23/08/2019 @ 02:00)

Manage microservices-based applications with security-focused Istio and Red Hat OpenShift  Voir?

Red Hat announced the general availability of Red Hat OpenShift Service Mesh to connect, observe and simplify service-to-service communication of Kubernetes applications on Red Hat OpenShift 4, the industry’s most comprehensive enterprise Kubernetes platform. Based on the Istio, Kiali and Jaeger projects and enhanced with Kubernetes Operators, OpenShift Service Mesh is designed to deliver a more efficient, end-to-end developer experience around microservices-based application architectures. This helps to free developer teams from the complex tasks of … More

The post Manage microservices-based applications with security-focused Istio and Red Hat OpenShift appeared first on Help Net Security.

... / ... Lire la suite

(23/08/2019 @ 01:30)

Cybersecurity salary, skills, and stress survey  Voir?

Exabeam is conducting an annual survey to understand skills, compensation trends and workplace trends among SOC and security analysts. All participants will receive the results of the survey. Questions include certifications, security responsibilities, compensation ranges, and perceptions around new tech like machine learning and AI. Completing the survey takes 7 minutes (less if you are a really fast reader). The results of the survey are anonymous. Prizes for participants They will randomly select 10 winners … More

The post Cybersecurity salary, skills, and stress survey appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 12:24)

Cisco warns about public exploit code for critical flaws in its 220 Series smart switches  Voir?

Cisco has fixed over 30 vulnerabilities in various solutions, including Cisco UCS Director, Cisco UCS Director Express for Big Data, Cisco IMC Supervisor, and the Cisco 220 Series smart switches. Updates by product Users of Cisco UCS Director and Cisco UCS Director Express for Big Data are advised to upgrade to versions 6.7.3.0 and 3.7.3.0, respectively, as they fix, among other things: CVE-2019-1938, an API authentication bypass vulnerability that could be triggered by a specially … More

The post Cisco warns about public exploit code for critical flaws in its 220 Series smart switches appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 11:47)

400G Triton cyber warfare simulation tool can replicate any attack  Voir?

Telesoft Technologies — a provider of cyber security technologies for high-density cyber environments, including network, government, and large organizations — has announced the release of Triton 400, a cyber warfare simulation tool which can replicate myriad adversarial attack methods. Mimicking attacks from all over the world, Triton 400 utilises a comprehensive understanding of frontline threat intelligence from around the globe to simulate natural and malicious traffic at unprecedented speeds for such a capability. Taking a … More

The post 400G Triton cyber warfare simulation tool can replicate any attack appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 11:16)

Unlocking the future of blockchain innovation with privacy-preserving technologies  Voir?

The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision of a new financial system underscored by cryptography and trust in code. Throughout the past decade, iterations of this technological infrastructure have gradually built out a diverse industry ecosystem, allowing for use cases that extend beyond cryptocurrencies and peer-to-peer transactions. From smart contracts to asset … More

The post Unlocking the future of blockchain innovation with privacy-preserving technologies appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 07:00)

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses  Voir?

The dream of an AI-influenced world is finally here. After decades of writing about it, AI has reached a point where it’s ingrained into our daily lives. From the days of SmarterChild – for many, the AIM messenger bot was the first foray into AI – to now the ubiquitous presence of the AI-enabled digital assistant such as Siri, the vision of artificial intelligence transforming
 from sci-fi to reality has come to fruition. But instead … More

The post From SmarterChild to Siri: Why AI is the competitive advantage securing businesses appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 06:30)

Identifying vulnerable IoT devices by the companion app they use  Voir?

For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a slew of security vulnerabilities that could turn them into a nightmare. Until legislation catches up and manufacturers start caring about implementing security from the start, security researchers are our only hope when it comes to improving IoT security. Consequently, every approach that makes the process of identifying as … More

The post Identifying vulnerable IoT devices by the companion app they use appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 06:00)

Identifying evasive threats hiding inside the network  Voir?

There is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting savvier. They are better at blending in without tripping any alerts. They skip over tools and techniques that trigger standard security systems. How can a company tell them apart from the noise created by legitimate logins to the network that day? The answer lies in context. It … More

The post Identifying evasive threats hiding inside the network appeared first on Help Net Security.

... / ... Lire la suite

(22/08/2019 @ 05:23)

Dernière mise à jour : 23/08/2019 @ 04:52