Oath rolls out unified bug bounty program

Oath has rolled out a unified bug bounty program, rolling existing bug bounty initiatives across its four different programs—Tumblr, Yahoo, Verizon Digital Media Service (VDMS) and AOL—into a single offering on the HackerOne platform. “Surfacing vulnerabilities and resolving them before our adversaries can exploit them is essential in helping us build brands people love and trust,” said Chris … [Read more...]

IBM Security launches open-source AI

IBM Security unveiled an open-source toolkit at RSA 2018 that will allow the cyber community to test their AI-based security defenses against a strong and complex opponent in order to help build resilience and dependability into their systems. The toolkit, called the Adversarial Robustness Toolbox, goes beyond the usual collection of attacks used to test an AI's ability, Sridhar Muppidi, IBM … [Read more...]

Thycotic Secret Server & Nessus in coexistence

Orthology Ltd consists of specialized and certified IT professionals which focus on delivering software solutions! This time, we are here to announce the coexistence of two professional software which combine powerful safety and control! ''Thycotic secret server is an entreprice password management software and Nessus Manager is a powerful detection, scanner and auditing software. Both have … [Read more...]

Looking to reduce GDPR liability, Facebook ports 1.5B non-U.S. users to domestic HQ

In an effort to reduce its liability under Europe's General Data Protection Regulation (GDPR) set to take effect in May, Facebook has transferred responsibility for more than 1.5 billion users in Latin America, Asia, Africa and Australia from its Ireland-based headquarters to its domestic headquarters in California. ''We apply the same privacy protections everywhere....the company said in … [Read more...]

Intel announces new chip designs with built-in security

Intel Monday announced three new measures that will be implemented in a future chip designed to bake security into the hardware following last year's Spectre/Meltdown vulnerability. The first measure promises to improve security by using Accelerated Memory Scanning to free up graphics hardware resources so they can be used to scan computer memory for malware, the firm said at the 2018 RSA … [Read more...]

Companies More Concerned With Private Data Loss Than With Hackers

With network security top of mind, businesses are nearly two times more concerned with losing private data (47 percent ) than hackers disrupting their systems (26 percent), according to the 2016 Network Security and Data Privacy Study, by Wells Fargo Insurance. Misuse of technology among employees also emerged as a new, growing threat (seven percent), while network viruses and disruption of … [Read more...]

First Look: Bitdefender Hypervisor Introspection (HVI)

Bitdefender's Hypervisor Introspection (HVI) tool is designed to solve a difficult problem in virtual environments. Once a sophisticated malware enters the virtual machine and alters the kernel – or performs some other rootkit function – it is nearly impossible for the typical anti-malware...Read here!   … [Read more...]

Pompeo will put resources into cyber at State Dept., agency warns employees of uptick in hacking attempts

On the same day the State Department warned employees about an uptick in hackers' efforts to target them, CIA Director Mike Pompeo told lawmakers Thursday he would “put a great deal of resources” into cybersecurity if he nabbed the Secretary of State slot. “I can only say that, every element of government has a piece of its cyber duty. It's one of the challenges that it's so ...Pompeo said … [Read more...]

GDPR and the End of the Internet’s Grand Bargain

In May the European Union’s General Data Protection Regulation goes into effect, two years after passage by the European Parliament. This radical new privacy law, which covers any business that processes information about EU residents, will dramatically affect the way data is collected, stored, and used, including for U.S. companies doing business abroad. In the U.S., lawmakers are now circling … [Read more...]

Why and How You Should Harden Your Systems

  So, you’ve been hacked. Maybe your system was modified for malicious reasons, your information was stolen, or your website was defaced. All of these scenarios cause panic. The effects of a successful breach can result in loss of revenue, customer trust, shareholder faith, sensitive data, and even your business. Putting protective measures in place will strengthen your security … [Read more...]