Search results for: software

US agricultural co-op hit by ransomware, expects food supply chain disruption

New Cooperative Inc., an agricultural cooperative owned by Iowa corn and soy farmers, has been hit by the BlackMatter ransomware group. The attackers are asking the co-op to pay $5,900,000 for the decryption key and not to release the stolen data. What we know about the ransomware attack on New Cooperative? New Cooperative is one of the largest farm cooperatives in the US. They confirmed the attack on Monday and said that the “cybersecurity incident” … More

microsoft power apps

Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings

Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching consequences, allowing threat actors to access an abundance of valuable, personal information and use it to their advantage. Over the last 12-18 months, the COVID-19 pandemic has driven the rapid adoption of cloud applications across the world. According to Cloudwards, 94% of all enterprises now use cloud services. Whilst organizations … More

patch

The complexities of vulnerability remediation and proactive patching

In this interview with Help Net Security, Eran Livne, Director, Product Management, Endpoint Remediation at Qualys, discusses vulnerability remediation complexity, the challenges related to proactive patching, as well as Qualys Patch Management. What makes vulnerability remediation a complex task? Most vulnerability remediation involves multiple teams and processes – first, a scanning tool identifies vulnerabilities, and then they are passed to the patching team for remediation. This is a pain point for organizations and leads to … More

fix

77% of execs concerned about security tools gaps in their company

77% of Americans believe their company has gaps in its current security tools, according to Lynx Software survey findings. 500 Americans in managerial and executive roles were surveyed to find out their opinions on the security of their companies and industry as a whole. The results found that 89% are concerned about external security threats to their company, and nearly the same amount, 86%, are concerned about threats from inside. “Now more than ever, it … More

ProLion ClusterLion for SAP now available on Azure Marketplace

ProLion launched its ClusterLion for SAP on the Microsoft Azure Marketplace. ProLion customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management for the first time. ProLion ClusterLion for SAP HANA delivers availability for SAP HANA and SAP NetWeaver, developed to implement automatic takeover, and deliver the highest degree of availability for SAP HANA environments. ClusterLion for SAP offers the highest degree of availability and ensures data … More

CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts

A wide range of organizations from defence to banking are preparing for ‘Y2Q’, the moment when a sufficiently developed quantum computer emerges that can break today’s encryption. As a trusted cyber security supplier to ultra high net worth individuals, CDS Group are rolling out a quantum-safe VPN to protect its clients and their assets. CDS currently provides cyber security services to an ever increasing number of some of the world’s largest super yachts. By deploying … More

Shauli Rozen

Securing Kubernetes as it becomes mainstream

In this interview with Help Net Security, Shauli Rozen, CEO at ARMO, talks about securing Kubernetes (K8s) systems, what makes them susceptible to cyberattacks and what should organizations expect when deploying them. As every other platform, Kubernetes is susceptible to cyberattacks. What drives cybercriminals to target Kubernetes and what do they hope to gain? That’s a question that is best answered from an attacker’s point of view. So, what are attackers looking for? They are … More

data

What businesses need to know about data decay

Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer be easily understood, cannot be effectively leveraged and, therefore, lacks value. In the next five years, it is expected that more than 180 zettabytes of data will be created, which means that data decay is certain to happen at an even faster … More

zero trust

Zero trust security solutions widely adopted, spurred by surge in ransomware

Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the recent sharp increase in ransomware and other sophisticated cyberattacks, the majority of organizations – 80% – have concrete plans to enable zero trust security solutions within the next year, with over half planning to begin implementation during 2021. Of the almost 1300 security and risk professionals who participated … More

Mirantis Flow provides virtualization and containerization in the data center

Mirantis launched Mirantis Flow, a vendor-agnostic, cloud-native data center-as-a-service aimed at businesses currently using costly, lock-in cloud infrastructure technology to modernize infrastructure while enabling both virtualization and containerization for all application types. Mirantis Flow also simplifies onboarding for businesses just beginning their cloud journey. Flow makes it easy to quickly — in as little as five days — deploy and run a centrally managed, scalable cloud infrastructure providing virtualization and containerization in the data center, … More

Kolide raises $17M to fuel the growth and expansion of its go-to market strategy

Kolide raised $17M in Series B investment funding bringing the total funding to date to $27M. The round was led by Boston-based OpenView Partners, a VC that exclusively invests in product-led SaaS B2B companies. OpenView joined other participating investors such as Matrix Partners, who previously led the Series A. Kolide is betting big on a user-focused approach to endpoint security. Unlike other endpoint security products which ignore users and only alert the security team, Kolide’s … More

open source

Open source cyberattacks increasing by 650%, popular projects more vulnerable

Sonatype released a report that revealed continued strong growth in open source supply and demand dynamics. Further, with regard to open source security risks, the report reveals a 650% year over year increase in supply chain attacks aimed at upstream public repositories, and a fascinating dichotomy pertaining to the level of known vulnerabilities present in popular and non-popular project versions. Based on survey responses collected from 702 software engineering professionals, the research observes a fundamental … More