2018

The Pentagon should take into account the cybersecurity capabilities of defense contractors in addition to cost and performance measures when awarding contracts, a U.S. government-funded think tank recommended in a report published Monday. Through its buying process, the Pentagon “can influence and shape the conduct of its suppliers,” the Mitre Corp. said in a report […]

by

Cybersecurity player Exabeam is announcing $50 million in Series D funding. The round was led by Lightspeed Venture Partners, the firm behind the Snap, Nutanix and MuleSoft IPOs, and supported by Aspect Ventures, Icon Ventures, Norwest Venture Partners and cybersecurity investor Shlomo Kramer. Exabeam is a cybersecurity newcomer that’s using data and AI to detect […]

by

<![CDATA[ ]]> Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, announced the new discovery of a cyber espionage campaign from a group called Leafminer, which has been targeting government organizations and business verticals across the Middle East since at least early 2017. Leafminer attempts to infiltrate target networks using three main techniques for […]

by

VILNIUS – Russia poses the biggest cyber threat to Lithuania, Vice Minister of National Defense Edvinas Kerza says. “The biggest threat for Lithuania comes from the Russian Federation. Very specific criminal groups have been identified and they are funded by Russian authorities. These groups create complex viruses undetectable for commercial measures, and their main goal […]

by

‘; winimg.document.writeln(doc); winimg.document.close(); } //]] li>ul,.container,#coinslid {background-color:#ffffff} ul#serinfo-nav{border-color:#ffffff !important} .body2,.header_scroll,.headbg,.header_noslide,#footer,#rightsidebar,#navigation{background-color:#404040} #nav li a,.nav>li>a,.nav>li>a{border-color:#404040} #serinfo,#serinfo-nav li.current{background-color:#f9f9f9} .overrating,#sidebar p input[type=submit],span.ribbon,a#triggernav,a#triggernav-sec,a.fromhome,.imgwrap,a.mainbutton,a.itembutton,.page-numbers.current,a.comment-reply-link,#submit,#comments .navigation a,.tagssingle a,.contact-form .submit,.intro,li.main h2,.plan-bottom a,.scrollTo_top a,.gallery-item, submit{background-color:#EC9D3A} a.moreposts{color:#EC9D3A !important} body{background-color:#fff} h2.widget{border-color:#fff !important} .body1 a, a:link, a:visited,.nav li ul li a{color:#2e372f} span>a.moreposts,ul#serinfo-nav li a{color:#2e372f !important} a:hover,.body1 a:hover,#serinfo a:hover,.nav>li.sfHover>a,.nav>li.current-menu-item>a,#serinfo-nav li.current a,#sec-nav>li.current-menu-item>a,ul#tabsmall>li.ui-tabs-selected>a.sidnav{color:#ec9c3a !important} .nav>li>a:hover,.nav>li.current-menu-ancestor>a,.nav>li.current-menu-item>a,.nav>li.sfHover>a,.nav>li.current-menu-item>a{border-bottom-color:#ec9c3a !important} .body2 a,a.body2 {color:#fff} .body2 […]

by

The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyber attacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats. Key takeaways The recent patch update consists of 27 patches with the majority […]

by

This article appeared in Cybersecurity Law Strategy, an ALM publication for privacy and security professionals, chief information security officers, chief information officers, chief technology officers, corporate counsel, internet and tech practitioners, in-house counsel. Visit the website to learn more. … read more at: https://www.propertycasualty360.com/2018/08/14/five-takeaways-from-recent-cybersecurity-developme/

by