• Akamai to acquire cloud-based security solutions provider Prolexic

    Organizations, faced with an ever-changing threat landscape, require comprehensive security solutions that address many different protection scenarios. These include securing mission critical Web properties and applications from attack, as well as protecting the full suite of enterprise IP applications — including e-mail, file transfers, and VPN — across a data center. Akamai acquires Prolexic in order to extend its Web optimization and security offerings by adding cloud-based security solutions for protecting data centers and enterprise applications.

  • Developing cyber resilience to meet increasing cyberthreats

    Managing resilience for cyber systems requires metrics that reflect the relationships among system components in physical, information, cognitive, and social domains. In a paper, researchers describe a framework for understanding the concept of cyber resilience, and lay out a systematic method by which to generate resilience metrics for cyber systems.

  • Cybersecurity paradigm shift: from reaction to prediction and prevention

    The intensification of cyberattacks on corporations and government agencies has led to a surge of new companies offering cybersecurity solutions, and Israel boasts some of the world’s top cybersecurity firms.Until recently, investment dollars generally supported startups with a focus on defensive cyber solutions, but now firms like Israel’s CyberArk, providers of proactive and full-service cyber solutions, are of growing interest of tech investors.

  • Government, private sector prioritize cybersecurity education

    As government and private sector organizations transmit and store more information electronically, the need for professionals with skills to protect and evaluate sensitive information is increasing. American companies and government agencies are expanding various initiatives aimed at increasing the number of cybersecurity professionals in the country.

  • view counter
  • Using keyboard, mouse, and mobile device “fingerprints” to protect data

    Passwords are not secure because they can be hacked or hijacked to get at sensitive personal, corporate, or even national security data. Researchers suggest a more secure way to verify computer users and protect data: tracking individual typing patterns. The researchers are now working on developing ways to identify and track individual patterns of using a mobile device or a computer mouse.

  • U.S. financial industry pushes Congress to pass cybersecurity bill

    Three financial-industry trade groups have issued a letter to senior members of the Senate Select Committee on Intelligenceto re-energize a campaign for moving forward with cybersecurity legislation. The trade groups, representing the U.S. largest financial institutions, said their ability to prevent cyberattacks will be hindered unless Congress acts.

  • view counter
  • Inkblots bolster security of online passwords

    Computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often occurs, lists of passwords get stolen from websites. This new type of password, dubbed a GOTCHA (Generating panOptic Turing Tests to Tell Computers and Humans Apart), could foil growing problem of automated brute force attacks, and would be suitable for protecting high-value accounts, such as bank accounts, medical records, and other sensitive information.

  • Weakening cybersecurity to facilitate NSA surveillance is dangerous: experts

    In the wake of revelations about the NSA surveillance programs, an expert on surveillance and cybersecurity recommended a re-evaluation of those surveillance practices that weaken commercial products and services. These practices include weakening standards and placing “back doors” into products that are accessible to U.S. government agencies. The expert – Jon Peha, former chief technology officer of the FCC and assistant director of the White House’s Office of Science and Technology — said deliberately weakening commercial products and services may make it easier for U.S. intelligence agencies to conduct surveillance, but “this strategy also inevitably makes it easier for criminals, terrorists and foreign powers to infiltrate these systems for their own purposes.”

  • Making cybersecurity a political issue

    U.S. federal agencies have reported a dramatic rise in the number of cyberattacks over the past few years, with reported cyber incidents rising from 5,503 in 2006 to 48,562 in 2012. Since cyber incidents pose such a threat to national security and infrastructure, could cybersecurity become a political campaign issue? Experts say that if politicians were to focus their attention, and their constituents’ attention, on cybersecurity, the United States could be made safer from cyberattacks before a “cyber Pearl Harbor” – or a “cyber 9/11” – occurs.

  • Trustev closes $3 million seed funding round

    According to research by eMarketer, global e-commerce sales are expected to reach nearly $1.3 trillion in 2013, making online fraud prevention an urgent and important requirement for every merchant. Trustev addresses this requirement by using multiple dynamic data sources to independently verify a user’s identity on e-commerce sites. The company has just closed a $3 million seed funding round to finance the further development of its e-commerce security and online fraud protection technology.

  • Preventing a “cyber Pearl Harbor”

    Cyber-security has become the new homeland security of the decade. Last year, then- Defense Secretary Leon Panetta issued a call to arms against cyberattacks, warning that sophisticated attacks against the United States could be America’s next “cyber Pearl Harbor.” It is imperative that we apply the same level of awareness and action as we have to the physical security of our facilities to ensure our security against this ever-evolving threat.

  • Mobile phone use a significant security risks for companies

    New research suggests that companies are leaving themselves open to potentially serious security and legal risks by employees’ improper use of corporate mobile devices. Experts looked at a sample of mobile phones returned by the employees from one Fortune 500 company and found that they were able to retrieve large amounts of sensitive corporate and personal information. The loss of data such as this has potential security risks, inviting breaches on both an individual and corporate level.

  • Cyphort, a threat monitoring specialist, raises $15.5 million Series B funding

    San Jose, California-based Cyphort, Inc., a company specializing in advanced threat monitoring and mitigation platform, has closed in $15.5 million Series B funding. The round was led by Menlo Park, California-based Trinity Ventures with participation from existing investors Foundation Capital and Matrix Capital. Cyphort’s platform blends multi-phase behavioral analysis, machine learning, and correlation to provide businesses with real-time detection, context, and mitigation for advanced malware attacks that bypass traditional security and first generation APT solutions.

  • NIST seeks public comments on updated smart-grid cybersecurity guidelines

    The National Institute of Standards and Technology (NIST) is requesting public comments on the first revision to its guidelines for secure implementation of “smart grid” technology. The draft document, NIST Interagency Report (IR) 7628 Revision 1: Guidelines for Smart Grid Cybersecurity, is the first update to NISTIR 7628 since its initial publication in September 2010.

  • DDoS protection specialist Black Lotus raises $3.5 million

    San Francisco-based Black Lotus, a DDoS protection specialist, last week announced the completion of its first institutional financing in the amount of $3.5 million. The round was led by San Francisco-based Industry Capital. The strategic investment will fund entry into new markets, where Black Lotus will deploy additional capacity and improve quality of service through peering and closer proximity to global partner networks.