Security engineering Press Release
|04/13/2017 - 12:13||
Returning from Washington, Felten seeks dialogue between technology and policy
Edward Felten, the Robert E. Kahn Professor of Computer Science and Public Affairs, recently returned to Princeton as the director of the Center for Information Technology Policy. Felten, who studies the intersection of public policy and information technology, served as a technology adviser at the Federal Trade Commission and the White House during portions of the Obama administration. Felten participated at the Princeton-Fung Global Forum in Berlin on liberty and the digital age in March. He spoke about his experience working for the U.S. government in a recent interview.
|04/13/2017 - 07:08||
Safes on the Internet – Caution when Comparing
In the search for favorable safes, many private individuals rely on the Internet. Security and safety requirements are always individual, which makes them difficult to be captured online.
|04/12/2017 - 14:32||
Mercury Systems Debuts First Self-Encrypting Commercial SSD for Classified Programs
ANDOVER, Mass. - April 12, 2017 - Mercury Systems, Inc.
|04/12/2017 - 09:10||
New Global Trustwave Report Reveals Shift in Cybersecurity Pressures from the Boardroom to Individual Professionals
CHICAGO - April 12, 2017 - Trustwave today released its 2017 Security Pressures Report, based on a global survey of 1,600 information security decision makers that measures the immense pressure in-house cybersecurity professionals face and the key drivers behind that pressure. The fourth-annual report also provides a year-over-year comparison of 2015 and 2016 and includes regional viewpoints from the United States, Canada, United Kingdom, Australia, Singapore and, for the first time, Japan. The report offers recommendations to help businesses ease employee distress and create higher-performing security teams.
|04/12/2017 - 08:05||
World Federation of Exchanges publishes cyber resilience standards
Strategy & Framework: Effective cyber framework arrangements should be in place to establish, implement and review the approach to managing cyber risk.
|04/12/2017 - 02:53||
Akamai Security Intelligence Response Team Identifies New Reflection Attack Method
Akamai Technologies, Inc. (NASDAQ: AKAM), the global leader in content delivery network (CDN) services, today published new research from the company’s Security Intelligence Response Team (SIRT). Akamai researchers Jose Arteaga and Wilber Majia have identified a new Connection-less Lightweight Directory Access Protocol (CLDAP) reflection and amplification method. Akamai SIRT has observed this attack vector producing Distributed Denial of Service (DDoS) attacks consistently exceeding 1 Gbps, comparable to Domain Name System (DNS) reflection attacks.
|04/11/2017 - 22:43||
India - Cisco Inaugurates Cyber Range Lab In India
New Delhi, December 22, 2017: Deepening its commitment to enhancing cybersecurity in India, Cisco India today inaugurated its Cyber Range Lab in Gurgaon, India. The Cisco® Cyber Range Lab aims to provide highly specialized technical training workshops to help security staff build the skills and experience necessary to combat new-age risks. Dr. Gulshan Rai, National Cyber Security Coordinator, Government of India, inaugurated the Cyber Range Lab in the presence of Dinesh Malkani, President, Cisco India and SAARC at the Cisco India Summit 2017.
|04/11/2017 - 16:56||
Buchanan & Edwards Acquires R2C
WASHINGTON–( )–Buchanan & Edwards Inc., a technology leader creating transformative solutions for government customers, announced today that it has acquired The Reports and Requirements Company (R2C) LLC, a government service provider offering national security-focused consulting services in intelligence collection, training support and data governance and analysis. With this acquisition and the addition of R2C’s advanced capabilities in front-end data governance and curation, BE’s offering will expand to include a powerful, full life cycle of analytics solutions to support government customers across the spectrum of national security, including defense, diplomatic corps, homeland security, law enforcement and the Intelligence Community.
|Buchanan and Edwards|
|04/11/2017 - 13:48||
Latest TitanXR Release from APCON Supports Single Screen Management and Dashboard Reporting Tool for Multiple EdgeSwitch Network Visibility Deployments
Wilsonville Ore., April 11, 2017 – APCON, a leading provider of intelligent network monitoring and security solutions, announced the latest release of its TitanXR multi-switch management software. TitanXR now provides easy access for centralized and remote management, status and alerts of the company’s recently announced EdgeSwitch, a high-density 1RU white-box packet aggregation switch.
|04/11/2017 - 12:44||
Trend Micro Leverages Newest XGen Security Capabilities in Worry-Free Services
DALLAS--( )--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced it is enhancing protection of small business endpoints by leveraging its newest capabilities of XGen™ security, including machine learning, inside Trend Micro Worry-Free Services. XGen™ security infuses high-fidelity machine learning into a blend of threat protection techniques to best protect against the full range of known and unknown threats across any user activity and endpoint. It constantly learns, adapts and automatically shares threat intelligence across the platforms and applications that matter most to customers.
|04/11/2017 - 09:02||
Can mobile phones be secured with a fingerprint?
No two people are believed to have identical fingerprints, but researchers from New York University and Michigan State University have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought.The vulnerability lies in the fact that fingerprint-based authentication systems feature small sensors that do not capture a user’s full fingerprint. Instead, they scan and store partial fingerprints, and many phones allow users to enroll several different fingers in their authentication system. Identity is confirmed when a user’s fingerprint matches any of the saved partial prints.
|Michigan State ...|
|04/11/2017 - 08:44||
Black Duck Launches 2017 Open Source 360 Survey
BURLINGTON, MA - April 11, 2017 – Black Duck, the global leader in automated solutions for securing and managing open source, today launched the 2017 Open Source 360° Survey, a new research initiative that will build on the trend analysis and insights provided over the last decade by its predecessor, the Future of Open Source Survey.
|04/11/2017 - 07:51||
Crossmatch Awarded $5.8 Million IARPA Contract to Develop Next-Gen Biometric Presentation Attack Detection Technologies
PALM BEACH GARDENS, Fla. - April 11, 2017 - Crossmatch®, a globally-recognized leader in biometric identity management and secure authentication solutions, today announced that it has been awarded a $5.8 million contract by Intelligence Advanced Research Projects Activity (IARPA) to develop next-generation Presentation Attack Detection (PAD) technologies for IARPA’s Thor program.
|Cross Match Tec...|
|04/11/2017 - 03:07||
EiQ Networks Recognized on CRNs 2017 Security 100 List
s. EiQ Networks, a pioneer in hybrid security as a service, today announced that it has been named to CRN’s annual Security 100 list. This project recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Management and Data Protection; Network Security; SIEM and Security Analytics; and Web, Email and Application Security.
|04/11/2017 - 02:38||
UK 5*StarS Consortium to focus on automotive cyber security
Greg Clark MP, Secretary of State for Business, Energy & Industrial Strategy, has today given the green light to 5*StarS as part of the national strategy to establish the UK as a global centre for the development, testing and commercialisation of Connected Autonomous Vehicles.
|04/10/2017 - 23:29||
Automation Advances Cybersecurity in the Artificial Intelligence Race but Challenges Remain
In its latest report that investigates the role of automation in cybersecurity settings, ABI Research finds that there are seven vital automated IT security applications that will function as the stepping stones necessary to advance cybersecurity in the new world of artificial intelligence. The automated processes will aid critical IT security functions that range from assisting security personnel to streamlining security alerts to system optimization.
|04/10/2017 - 23:26||
Celebrating a boost to New Zealand cybersecurity
New Zealand's new Computer Emergency Response Team (CERT NZ) opens its doors today, and InternetNZ is welcoming the day with open arms.
|04/10/2017 - 11:39||
Baking Hack Resistance Directly into Hardware
Military and civilian technological systems, from fighter aircraft to networked household appliances, are becoming ever more dependent upon software systems inherently vulnerable to electronic intruders. To meet its mission of preventing technological surprise and increasing national security, DARPA has advanced a number of technologies to make software more secure. But what if hardware could be recruited to do a bigger share of that work?
|04/10/2017 - 10:26||
Port San Antonio Breaks Ground on Project Tech Complex
On the cool spring morning of the 100th anniversary of Kelly Field’s first flights, Port San Antonio and community leaders broke ground on the site of Project Tech, a state-of-the-art technology complex that will house firms supporting San Antonio’s growing cybersecurity community.
|04/10/2017 - 09:38||
Internet Atlas maps the physical internet to enhance security
A team of scientists developed Internet Atlas, the first detailed map of the internet’s structure worldwide. The lines represent crucial pieces of the physical infrastructure of the internet that billions of people rely on.
|University of W...|
|04/10/2017 - 04:29||
Trend Micro Executive Named to Top 50 Influential Hispanic Leaders in Latin America/Ibero America
DALLAS--( )--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced that Hernán Armbruster, vice president and managing director for Canada, Latin America and the Caribbean, has been named one of the Top 50 Influential Hispanic Leaders in Latin America/Ibero America by the Hispanic IT Executive Council (HITEC).
|04/10/2017 - 02:07||
Big data and machine learning: A perfect pair for cyber security?
Online threats are emerging at a faster rate than ever. Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicous programs becoming more sophisticated, and in turn, they're harder to detect and mitigate quickly.
|04/07/2017 - 13:29||
TSA hosts STEM event for local high school students
TSA’s Office of Intelligence and Analysis and Office of Law Enforcement – in cooperation with the Women in Homeland Security – hosted the second annual Science, Technology, Engineering and Mathematics tour for students from the Arlington Career Center on Friday, March 31, at TSA Headquarters in Arlington, Va.
|04/07/2017 - 11:08||
Middlesex County, New Jersey, Man Charged With Theft Of Trade Secret Materials From Dupont
NEWARK, N.J. – A Middlesex County, New Jersey, man has been charged with stealing computer files containing trade secrets from a DuPont manufacturing facility in Parlin, New Jersey, Acting U.S. Attorney William E. Fitzpatrick announced today.
|04/06/2017 - 15:24||
Singtel and Inmarsat announce strategic partnership to strengthen global maritime cyber security capabilities
Singapore and London, 6 April 2016: Singapore Telecommunications Limited (Singtel) and Inmarsat (LSE:ISAT.L) have entered into a strategic partnership to enhance maritime cyber security using Trustwave’s Unified Threat Management (UTM) solution.