Cybersecurity

RapidFire Tools Inc. Launches Unlimited-Use Internal Cyber Security Service Delivery System For MSPs

Grazed from RapidFire Tools, Inc.

RapidFire Tools Inc. has bundled together a powerful new set of tools that, for the first time, allows MSPs to roll-out a high-value, automated and branded internal IT security service that can be offered to all of their clients. The new product, called Detector SDS (Service Delivery System), includes an unlimited-use license for its unique Detector™ cyber security alerting appliance, plus additional new tools that the MSP can use to define the level of service, dynamically build marketing materials to help sell the services they create, and built-in workflow automation to easily manage the cyber security alerts through a common interface. Everything in the system, including the unlimited-use Detector appliance license, is covered by a low monthly subscription.

The Detector SDS solution comes pre-configured with a set of three "white-labeled" cyber security service plans -- "Silver," "Gold" and "Platinum." MSPs can deliver these as-is, "out-of-the-box," or modify them to meet the needs of individual clients using the built-in, menu-driven "Service Plan Creator." The pre-configured services, as well as the customized ones, can all be renamed and branded by the MSP. Once the plans are created, the MSP can quickly and easily select one or more plans to present to a client or prospect, and the system will automatically generate a professionally-formatted and branded "Plan Matrix" sales sheet. The Plan Matrix has a column for each service plan, in addition to neatly organized check-boxes that allow the client to easily see the differences in the individual plan features and deliverables. In addition, the system can automatically generate a branded Service Catalog for each Plan Matrix, providing more details about each of the deliverables included with each different level of service.
 

AlienVault Takes Proven Unified Security Management Platform to the Cloud

Grazed from AlienVault

AlienVault, the leading provider of Unified Security Management (USM) and crowdsourced threat intelligence, today announced the availability of USM Anywhere, the first all-in-one Software-as-a-Service (SaaS) security monitoring platform designed to centralize threat detection, incident response, and compliance management of cloud, hybrid cloud, and on-premises environments from a single cloud-based console.

Built natively in the cloud to monitor hybrid cloud environments, USM Anywhere is a comprehensive, unified solution that significantly simplifies security and reduces deployment time, so that companies of all sizes can go from installation to first insight within minutes. USM Anywhere also provides advanced automated response orchestration with external security tools and applications, making it easier for IT teams to respond quickly and efficiently to identified threats.

Simplifying Threat Detection and Response

ServiceNow Resolves Real Security Threats Fast

Grazed from ServiceNow

ServiceNow, the enterprise cloud company, today announced integrations from leading cybersecurity companies into ServiceNow Security Operations solution. With ServiceNow customers can prioritize threats and use a structured response engine to resolve real security threats fast. Now security analysts can easily enrich threat information, map those threats to the underlying business service at risk, and easily collaborate with IT to automatically resolve them. This replaces the manual, slow and ineffective back-and-forth resolution process of the past.

While enterprises have invested heavily in protection and detection tools, security response is often left unaddressed. Determining whether an alert constitutes an actual threat can take hours. Security analysts use email, phone calls and spreadsheets to coordinate remediation with IT teams. These manual processes are error-prone and unwieldy, leading to lengthy breach containment times of 70 days on average, according to the Ponemon Institute.

ServiceNow Security Operations replaces the manual work patterns of the past with intelligent workflows of the future and just added several new automation integrations from leading security vendors. In as little as 20 seconds, Security Operations automatically enriches each security incident with threat intelligence, including information from potentially affected endpoints. This allows security analysts to spend less time on researching problems and to get to resolution faster. In addition, ServiceNow Security Operations eliminates the need for manual data collection by automatically generating a post-incident report for later analysis, reporting or audit.

Cloud Computing: Sophisticated Phishing - Beware the Latest Gmail Phishing Attack

Grazed from Sci-Tech Today. Author: Editorial Staff.

Hackers have reportedly devised a new phishing method which seems to be tricking even the most experienced and tech savvy users into revealing their account details. The highly effective phishing campaign seems to be running on a sophisticated automation feature that pounces on newly compromised Gmail accounts to mount a secondary attack on users in the contact list.

Once hackers have taken over a Gmail account, they launch their secondary attack by sending out emails disguised under recently sent attachments and a relevant subject line. The email contains a thumbnail version of the attachment which, when clicked, opens up a convincing Gmail login box a trap that tricks users in revealing their Gmail account password...

Cloud Computing: Building your data castle - Protecting from ransomware and restoring data after a breach

Grazed from CloudTech. Author: David Trossell.

The data centre is the castle. You can pull up the drawbridge, fill up the moat, or pull down the portcullis. But at some point, you have to let data in and out, and this opens up the opportunity for ransomware attacks. No longer is it a matter of pride and peer recognition in the hacker community for circumnavigating and exposing the security of an organisation because it is now a fully-fledged industry in its own right with the use of ransomware.

That cybersecurity company Herjavec Group estimates to top a $1 Billon in 2016. In the past, those under siege used to flood the moats, pull up the drawbridges and drop the portcullis to protect themselves but with the modern data centre organisations life blood is the movement of data in and out of the data centre...

Cloud Computing: Preparing for a year of ‘unknown unknowns’ in cyber security

Grazed from CloudComputing. Author: Mike East.

Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many believe that this trend starts and ends with a contentious election, it’s not something that’s going away in 2017.

In fact, we’re starting to see continued and varied threats, most recently with DDoS attacks taking down the likes of the EU commission. Overall, the pace and variation of exploits driven by technically astute adversaries, will only gain momentum in the coming year if not managed effectively...

Read more from the source @ http://www.cloudcomputing-news.net/news/2016/dec/07/preparing-year-unknown-unknowns-cyber-security/

Employees Are One of the Biggest Cyberthreats to Businesses in North America

Grazed from Kaspersky Lab

Kaspersky Lab today released a report, Business Perception of IT Security: In the Face of an Inevitable Compromise, revealing the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents experienced over the past year, both in North America and worldwide. A top concern of North American businesses and a leading cause of successful cyberattacks in these organizations are also the most important asset: their employees.

The findings are a subset of data from the 2016 Kaspersky Lab Corporate IT Security Risks survey, which confirms cyberattacks are not uncommon to businesses throughout the world. In just the last 12 months on a global scale, 43 percent of businesses experienced data loss as a result of a breach. When taking a closer look at businesses in North America, the data reveals that these organizations are significantly less protected against attacks compare to businesses worldwide. For enterprises, nearly half (44 percent) in North America suffered four or more data breaches in the past 12 months alone, which is double the amount that businesses worldwide suffered (20 percent).

Alphabet Inc Shuts Down Cloud Service Of Client For Malicious Attacks

Grazed from MarketExclusive. Author: Adam Russell.

Fred Trotter, the executive of healthcare research startup CareSet and healthcare startup DocGraph recently got to work only to find that Alphabet Inc (NASDAQ:GOOGL) had locked him out of his cloud computing service. The CEO reported to work as usual on Monday morning only to finds that Alphabet had shut down his firm’s account on the Google Cloud computing service, worrying him and his team.

Trotter received a warning that one of his systems had been carrying out intrusive attacks against third parties. Alphabet condemned the act and warned the executive and his team that the problem should be fixed. Alternatively, they were expected to explain the legitimacy of the unexpected network traffic. Alphabet threatened to terminate the cloud services if the CEO and his team failed to carry out any of the requests...

Cloud Computing: 5 Cybersecurity Threats Businesses Should Watch Out for in 2016

Grazed from Tech.co. Author: Dennis Hung.

From phishing attacks to new and creative malware to infected laptops, cyber-crime is globally growing at an alarming rate. These cyber criminals are not just targeting the blue chip companies and large corporations as the media reports. According to Symantec, 43 percent of cyber-attacks in 2015 targeted small-to-medium sized businesses with around 250 to 500 workers. Experts forecast a continuation of this trend in 2016 with the global cybercrime industry growing to $600 billion a year. The weak cyber security protocols of these businesses make them easy targets. They also offer access to larger corporations and the government who are their clients.

Malware

Malware lurks in the background stealing company data such as usernames and passwords. These malware is mostly installed by unsuspecting employees. According to Blue Coat, the average data breach can cost an organization 5.4 million dollars. In April 2016, MetStar, a non-profit organization running 10 hospitals in the Baltimore and Washington area was a victim of SAMSAM ransomware that encrypted sensitive data, requiring them to pay up the amount of 45 Bitcoins (approx. US$ 18,500) for the decryption key. Luckily, the IT department was able to detect the malware and prevent it from spreading further into their internal network...

Read more from the source @ https://tech.co/cybersecurity-threats-businesses-watch-2016-05

VMware Patches Man-in-the-Middle and Web Session Hijack Vulnerability

By David Marshall

ATTN: VMware administrators.  Do you have plans this afternoon?  What about this weekend? 

"Patch now!" is the word coming down from the VMware mothership after the company revealed a new security flaw (VMSA-2016-0004) this week in the VMware Client Integration Plug-in that if exploited by an attacker could lead to a man-in-the-middle attack.