<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.7.3" -->
<rss version="2.0">
	<channel>
		<title>Security</title>
		<description></description>
		<link><![CDATA[http://www.it-sp.eu/index.php?option=com_content&task=category&id=38]]></link>
		<lastBuildDate>Fri, 01 May 2026 12:01:04 +0100</lastBuildDate>
        <generator>FeedCreator 1.7.3</generator>
		<item>
			<title>Microsoft Data Leaks and the Importance of Open-Source Intelligence</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4712:microsoft-data-leaks-and-the-importance-of-open-source-intelligence&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Author: Vaidotas Šedys, Head of Risk Management at Oxylabs

&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Vaidotas Šedys.jpg&quot; border=&quot;0&quot; alt=&quot;Sedys-Oxylabs&quot; height=&quot;200&quot; style=&quot;float: right; margin: 10px;&quot; /&gt;

Interconnected digital technology advances at a rapid pace, and so do the tactics and strategies employed by malicious individuals, criminal groups, and even nation-states. The &lt;a href=&quot;https://www3.weforum.org/docs/WEF_State_of_the_Connected_World_2023_Edition.pdf&quot;&gt;World Economic Forum&lt;/a&gt; predicts global cybercrime will reach $10.5 trillion by 2025, forcing businesses and governments to look for next-generation solutions against emerging digital threats. 

Unfortunately, deliberate criminal activity is only part of the...</description>
			<category>Security</category>
			<pubDate>Mon, 23 Oct 2023 00:00:00 +0100</pubDate>
		</item>
		<item>
			<title>Trend Micro: Cybercriminal Underground Lacks Trust!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4699:trend-micro-cybercriminal-underground-lacks-trust&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to Trend Micro research, trust has eroded among criminal interactions, leading to a switch to e-commerce platforms and communications via Discord, both to increase user anonymisation.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/trendmicro-3.jpg&quot; border=&quot;0&quot; alt=&quot;trend micro&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;&quot;This report highlights the threat intelligence we collect and analyze from global cybercriminal networks that enables us to alert, prepare and protect our corporate customers and partners,&quot; the company says. &quot;This research helps us inform businesses early about emerging threats, such as Deepfake ransomwa...</description>
			<category>Security</category>
			<pubDate>Thu, 28 May 2020 15:35:06 +0100</pubDate>
		</item>
		<item>
			<title>European Supercomputers Hacked to Mine Bitcoin!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4691:european-supercomputers-hacked-to-mine-bitcoin&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Supercomputers all across Europe have been infected with cryptocurrency mining malware, leading to a number of shutdowns during the crucial period where such machines should be dedicated to research on the coronavirus (aka Covid-19) pandemic.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/archersupercomputer.jpg&quot; border=&quot;0&quot; alt=&quot;Archer supercomputer&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
Security incidents come from all over the continent, including the UK, Germany, Switzerland and, at least rumours insist, Spain. According to a ZDNet report, the first supercomputer to be affected by the malware is the ARCHER system at the University of E...</description>
			<category>Security</category>
			<pubDate>Thu, 21 May 2020 15:38:44 +0100</pubDate>
		</item>
		<item>
			<title>Thunderbolt Flaw Leads to Hacking! </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4678:thunderbolt-flaw-leads-to-hacking-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Dutch researcher Björn Ruytenberg reveals the common Thunderbolt port has a serious flaw-- &quot;Thunderspy,&quot; a means for hackers to bypass the login screen of a sleeping or locked PC in order to gain full access of the data within.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Sec_thunderbolt_CWWNYE.jpg&quot; border=&quot;0&quot; alt=&quot;Thunderbolt&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The flaw resides in essentially all Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, and allows for what the security industry dubs an &quot;evil maid attack.&quot; This involves the potential attacker being alone with the PC (for example, in a hotel room), and s...</description>
			<category>Security</category>
			<pubDate>Wed, 13 May 2020 16:39:43 +0100</pubDate>
		</item>
		<item>
			<title>Acronis Ships Cyber Protect</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4669:acronis-ships-cyber-protect&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Acronis announces the availability of Cyber Protect, a solution integrating backup, disaster recovery, next-gen anti-malware, cybersecurity and endpoint management tools in a single service.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/acroniscyberprotect-banner.png&quot; border=&quot;0&quot; alt=&quot;Cyberprotect&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
As Acronis puts it, the lack of integration between vendor solutions complicates employee training, productivity and usability while increasing support and licensing costs. Cyber Protects gives MSPs a single solution to deliver backup, anti-malware, security and endpoint management capabilities such as vu...</description>
			<category>Security</category>
			<pubDate>Thu, 07 May 2020 15:41:42 +0100</pubDate>
		</item>
		<item>
			<title>Gartner: Coronavirus Leads to Security Concerns</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4663:gartner-coronavirus-leads-to-security-concerns&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to an April 2020 Gartner survey of 145 legal and compliance leaders over half of respondents-- specifically 52%-- believe cybersecurity and data breach is the most increased 3rd party risk their organisations face.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Security2xmin.jpg&quot; border=&quot;0&quot; alt=&quot;Security&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;“Remote working has been hastily adopted by suppliers to keep their business running, so it’s unlikely every organisation or employee is following best practices,” the analyst says. “Legal and compliance leaders are concerned about the new risks this highly disruptiv...</description>
			<category>Security</category>
			<pubDate>Thu, 30 Apr 2020 15:34:20 +0100</pubDate>
		</item>
		<item>
			<title>Cognizant Victim of Maze Malware</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4651:cognizant-victim-of-maze-malware&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Service provider Cognizant is the latest victim of Maze, a particularly virulent strain of malware that has interrupted parts of Cognizant business as it affects internal systems and &quot;some&quot; customers.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/hacker-security-data-2.jpg&quot; border=&quot;0&quot; alt=&quot;hacker&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The company is a giant in the field, and counts big names such as ING, Standard Life and Mitsubishi Motors as clients. So far it has not disclosed the names of clients potentially affected by the attack, but does say it may lead to revenue loss and incremental costs. The group associated with Maze ...</description>
			<category>Security</category>
			<pubDate>Fri, 24 Apr 2020 09:40:04 +0100</pubDate>
		</item>
		<item>
			<title>StorageCraft Intros OneXafe Solo 300</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4640:storagecraft-intros-onexafe-solo-300&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>StorageCraft announces the OneXafe Solo 300, a compact plug-and-play device designed to provide SMBs with enterprise-class data backup and recovery through a simple, cloud-based business continuity solution.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/storagecraft-OneXafe-Solo.jpg&quot; border=&quot;0&quot; alt=&quot;OneXafe Solo&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Launched following a global beta program, the OneXafe Solo 300 promises to be easy to configure, deploy and manage. It streams data to the cloud via simple internet connection, meaning it does not require onsite infrastructure, and is built using the same data protection technology behind th...</description>
			<category>Security</category>
			<pubDate>Fri, 10 Apr 2020 12:27:50 +0100</pubDate>
		</item>
		<item>
			<title>Increasing Zoom Demand Brings Security Issues</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4627:increasing-zoom-demand-brings-security-issues&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Videoconferencing is seeing a surge in demand following the coronavirus (aka Covid-19) pandemic, with the chief solution being Zoom-- a solution that, while popular, is currently beset by a bevy of security issues.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/zoommeetings.jpg&quot; border=&quot;0&quot; alt=&quot;Zoom meetings&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;A Zoom white paper on the topic of security states the videoconferencing service can secure meetings through end-to-end (E2E) encryption, something hosts can set up while creating a meeting. However, according to an investigation by The Intercept, Zoom does not actually feature E2E en...</description>
			<category>Security</category>
			<pubDate>Fri, 03 Apr 2020 09:48:32 +0100</pubDate>
		</item>
		<item>
			<title>Fortinet Presents Engage Partner Program</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4621:fortinet-presents-engage-partner-program&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Fortinet announces Fortinet Engage-- a partner program providing specialisations with a focus on growing markets, including SD-WAN and cloud, customised support and engagement flexibility to accelerate business growth and expansion.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/fortinetengage.jpg&quot; border=&quot;0&quot; alt=&quot;Fortinet Engage&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;“With today’s digital innovations being a catalyst for organisations to evolve their networks and security strategies, we have transformed our partner program so partners can untap new opportunities and rising markets, including SD-WAN,&quot; the company says. &quot;Buildi...</description>
			<category>Security</category>
			<pubDate>Thu, 26 Mar 2020 16:36:48 +0100</pubDate>
		</item>
		<item>
			<title>Intel Processors Hit With Load Value Injection</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4595:intel-processors-hit-with-load-value-injection&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The same team of researchers behind the discovery of microarchitectural attacks such as Meltdown, Spectre and Zombieload uncover yet another exploit lurking inside Intel CPUs-- Load Value Injection (LVI), a flaw allowing &quot;reverse Meltdown&quot; attacks.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/loadvalueinjection.png&quot; border=&quot;0&quot; alt=&quot;load value injection&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Discovered on 4 April 2019 and reported to Intel before public disclosure on 10 March 2020, LVI turns previous data extraction attacks and defeats all existing mitigations at both software and hardware levels. According to the researchers, this makes ...</description>
			<category>Security</category>
			<pubDate>Thu, 12 Mar 2020 10:28:20 +0100</pubDate>
		</item>
		<item>
			<title>IDC: Firewall Demand Drives Security Appliances </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4591:idc-firewall-demand-drives-security-appliances-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to IDC, the global security appliance market sees shipment and revenue growth in Q4 2019, as revenues are up by 9.4% Y-o-Y to $4.8 billion while shipments total 1.3 million units, a 21.1% Y-o-Y increase.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/idcq42019securityappliancevendors.png&quot; border=&quot;0&quot; alt=&quot;IDC Security appliances&quot; width=&quot;550&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
The traditional firewall segment accounts for the &quot;most significant&quot; revenue growth, as it accounts for over $192m more in revenue in Q4 2019 than Q4 2018. Despite being the overall largest segment, unified threat management (UTM) is up 5.8% Y-o-Y and represents 57.1% of the Q4 2019 ...</description>
			<category>Security</category>
			<pubDate>Fri, 06 Mar 2020 16:40:20 +0100</pubDate>
		</item>
		<item>
			<title>RMM Platforms Face Ransomware Threat!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4579:rmm-platforms-face-ransomware-threat-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Remote monitoring and management (RMM) platforms face a growing malware threat, Asigra warns, since an &quot;incessant&quot; stream of malware variants is putting both MSP and end-customer applications and data at &quot;significant&quot; risk.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/remote-access-trojan.jpg&quot; border=&quot;0&quot; alt=&quot;Remote access trojan&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;RMM software helps MSPs remotely and proactively monitor client endpoints, networks and computers. Formerly known as remote IT management, RMM requires an agent installed on client servers, hypervisors, workstations, networking devices, laptops and other mobile endpoints. In ...</description>
			<category>Security</category>
			<pubDate>Fri, 28 Feb 2020 10:37:58 +0100</pubDate>
		</item>
		<item>
			<title>Nok Nok Authentication for IoT Devices</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4569:nok-nok-authentication-for-iot-devices&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Authentication specialist Nok Nok Labs announces the Nok Nok IoT SDK bringing multi-factor authentication to both standard IoT devices and IoT devices connected to a cloud service via Nok Nok S3 Authentication Suite.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/noknokiotsdk.jpg&quot; border=&quot;0&quot; alt=&quot;Noknok security&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company, the IoT SK enables flexible, easy-to-use and secure user-to-device authentication leveraging the Nok Nok history of passwordless customer authentication across mobile apps, mobile web, desktop web and smartwatches. It runs easily on existing microcontroller...</description>
			<category>Security</category>
			<pubDate>Fri, 14 Feb 2020 14:45:52 +0100</pubDate>
		</item>
		<item>
			<title>RocketCyber Monitors Office 365</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4562:rocketcyber-monitors-office-365&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>RocketCyber announces a trio of security apps to help MSPs monitor threats targeting Office 365 and Azure Active Directory (AD), marking a first foray beyond endpoint protection for the company.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/logo_rocketcyber.png&quot; border=&quot;0&quot; alt=&quot;Rocketcyber&quot; width=&quot;300&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As the company puts it, moving infrastructure and applications to the cloud brings cost savings, convenience and performance to SMBs. However, such adoption often comes without oversight and security controls, introducing risk for intrusions, breaches and regulatory violations. The RocketCyber security a...</description>
			<category>Security</category>
			<pubDate>Thu, 06 Feb 2020 16:32:31 +0100</pubDate>
		</item>
		<item>
			<title>Netscout Intros Arbor Sightline with Sentinel </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4551:netscout-intros-arbor-sightline-with-sentinel-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Netscout Systems announces Arbor Sightline with Sentinel, a combination of core Arbor Networks and Netscout Layer 7 technologies promising the next generation of DDoS visibility and protection for service providers and large enterprises.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/netscoutlogo.jpg&quot; border=&quot;0&quot; alt=&quot;Netscout&quot; height=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Sightline with Sentinel also includes intelligent analytics, machine learning and automation to integrate network infrastructure defense into an orchestrated capability. The result, the company says, is unparalleled protection for network, customer and applicati...</description>
			<category>Security</category>
			<pubDate>Thu, 23 Jan 2020 16:36:53 +0100</pubDate>
		</item>
		<item>
			<title>WatchGuard Offers Pay-as-You-Go</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4539:watchguard-offers-pay-as-you-go&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>WatchGuard expands the FlexPay program to include fully automated monthly billing for network security hardware and services, available on both three-year and pay-as-you-go terms.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/watchguardfirebox.jpg&quot; border=&quot;0&quot; alt=&quot;Watchguard firebox&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company, the subscription-based offering allows solution provider to purchase WatchGuard security hardware and services from participating distributors without commitment or upfront costs. Thus, partners can procure WatchGuard solutions in whatever best matches the way they deal with end customers, be ...</description>
			<category>Security</category>
			<pubDate>Fri, 17 Jan 2020 16:00:37 +0100</pubDate>
		</item>
		<item>
			<title>A SNAKE to Look Out for in Enterprise Networks!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4535:a-snake-to-look-out-for-in-enterprise-networks&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Administrators need to look out for a new ransomware targeting enterprise networks across the world-- SNAKE, a nasty piece of software designed to encrypt all devices connected to the network.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/snakeransomware.jpg&quot; border=&quot;0&quot; alt=&quot;Snake ransomware&quot; height=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;SNAKE joins a growing number of enterprise ransomware, including Ryuk, Maze, Sodinokibi, LockerGoga, BitPaymer, DoppelPaymer, MegaCortex and LockerGoga. All are find use by threat actors to infiltrate business networks and gather administrator credentials before using post-exploit tools to encrypt all file...</description>
			<category>Security</category>
			<pubDate>Fri, 10 Jan 2020 16:30:13 +0100</pubDate>
		</item>
		<item>
			<title>SonicWall Expands MSSP Security Offering</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4513:sonicwall-expands-mssp-security-offering&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>SonicWall sets to improve the Capture Cloud Platform for managed security service providers (MSSPs) with features to manage accounts, register products, control licensing and provide real-time per-user threat analytics.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/SonicWall-logo-for-web-970x444.png&quot; border=&quot;0&quot; alt=&quot;Sonicwall&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;“MSSPs play an essential role in our expanding partner base as they defend enterprises and SMBs against today’s targeted cyber threats,” the company says. “Our growing SonicWall team continues to work with some of the world’s largest partners and distributors to provide...</description>
			<category>Security</category>
			<pubDate>Thu, 05 Dec 2019 16:44:05 +0100</pubDate>
		</item>
		<item>
			<title>Palo Alto Bolsters Security With Aporeto </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4508:palo-alto-bolsters-security-with-aporeto-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/palo_alto_networks_1.jpg&quot; border=&quot;0&quot; alt=&quot;Palo Alto Networks&quot; height=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Palo Alto Networks gets to boost the security capabilities of the Prisma platform with the acquisition of Aporeto, a machine identity-based microsegmentation company, for $150 million in cash.
“We are thrilled to welcome Aporeto to the Palo Alto Networks family,” Palo Alto says. “We believe the addition of Aporeto’s unique machine identity technology will further enhance our leading Prisma Cloud capabilities and strengthen our commitment to helping customers secure their journey to the c...</description>
			<category>Security</category>
			<pubDate>Fri, 29 Nov 2019 16:20:13 +0100</pubDate>
		</item>
		<item>
			<title>Trend Micro Secures the Cloud</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4496:trend-micro-secures-the-cloud&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Trend Micro launches a means to simplify hybrid and multi-cloud security-- Cloud One, a security services platform covering  workload, container, file object storage, serverless and application, and network security, as well as security posture management.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/trendmicrocloudone.png&quot; border=&quot;0&quot; alt=&quot;Cloud One&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
According to the company, Cloud One allows customers to migrate existing applications to the cloud, deliver cloud-native applications and achieve cloud operational excellence. It includes a leading security service already in use by &quot;thousa...</description>
			<category>Security</category>
			<pubDate>Wed, 20 Nov 2019 16:56:38 +0100</pubDate>
		</item>
		<item>
			<title>IDC: &quot;Solid Growth Ahead&quot; for Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4461:idc-qsolid-growth-aheadq-for-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Global spending on security products is to reach $106.6 billion in 2019, a 10.7% increase over 2018, IDC reports, and such solid growth is set to continue over the next 5 years as organisations continue to invest in solutions to meet a wide range of security threats and requirements.
Spending should grow to $151.2 billion by 2023 with a CAGR of 9.4% for the 2019-2023 forecast period.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/idcsecurityforecast2019.jpg&quot; border=&quot;0&quot; alt=&quot;IDC Security forecast&quot; width=&quot;550&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
&quot;The market for cybersecurity products continues to grow, growth that is renewed and reinvigorated by a C-leve...</description>
			<category>Security</category>
			<pubDate>Fri, 18 Oct 2019 09:42:08 +0100</pubDate>
		</item>
		<item>
			<title>Ponemon: Attacks on SMBs on the Rise</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4451:ponemon-attacks-on-smbs-on-the-rise&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>SMBs see a &quot;significant&quot; increase in targeted cybersecurity breaches for the 3rd consecutive year, Ponemon reports, with attacks growing across business in Europe, the UK and US in terms of both frequency and sophistication.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/smbsecurity.jpg&quot; border=&quot;0&quot; alt=&quot;SMB security&quot; height=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The findings come from the 2019 Global State of Cybersecurity in Small and Medium-Sized Businesses report, a survey commissioned by Keeper Security measuring the responses of 2391 IT and security practitioners in the US, UK, DACH, Benelux and Scandinavia. Of the number, 45% ...</description>
			<category>Security</category>
			<pubDate>Thu, 10 Oct 2019 15:37:36 +0100</pubDate>
		</item>
		<item>
			<title>The Implications of Quantum Computing With Sectigo </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4444:the-implications-of-quantum-computing-with-sectigo-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Quantum computing is all but set to transform the IT industry-- and to help enterprises prepare for such change, Sectigo offers a set of 15 educational resources for security professionals in the form of a white paper, podcasts and articles.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/quantumcrypto.jpg&quot; border=&quot;0&quot; alt=&quot;Quantum crypto&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
The computing architecture takes advantage of quantum mechanics to deliver capabilities beyond what is possible using traditional binary computing. However, quantum computers are destined to render the cryptographic underpinnings of current digital systems...</description>
			<category>Security</category>
			<pubDate>Fri, 04 Oct 2019 13:27:40 +0100</pubDate>
		</item>
		<item>
			<title>ALSO Adds CYE to Security Platform</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4437:also-adds-cye-to-security-platform&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/alsosecurityexpand.jpg&quot; border=&quot;0&quot; alt=&quot;ALSO security expand&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The ALSO security platform gets a solution from another provider with the Cybersecurity Intelligence SaaS Platform from CYE-- Hyver, a combination of advanced AI and services delivered by leading security experts.
Available to resellers via the ALSO Cloud Marketplace, the Hyver platform provides customers with improved security posture and automated remediation across the entire organisation. It promises a combo of both learning artificial intelligence and predictive analytics with comprehensive...</description>
			<category>Security</category>
			<pubDate>Fri, 04 Oct 2019 13:14:00 +0100</pubDate>
		</item>
		<item>
			<title>SolarWinds Helps MSPs with Password Management</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4429:solarwinds-helps-msps-with-password-management&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>SolarWinds uses the acquisition of password management vendor Passportal to bring about Passportal Site-- a program enabling MSPs to offer private and branded password management-as-a-service to customers.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/solarwindspassportal.png&quot; border=&quot;0&quot; alt=&quot;Solarwinds Passportal&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
The Passportal Site provides access to market development funds (MDFs) to create new services and, as a result, new recurring revenue streams. The website is designed to help MSPs automate and centralise password and credential management, allowing them to create solutions they can co-manage...</description>
			<category>Security</category>
			<pubDate>Thu, 26 Sep 2019 15:17:36 +0100</pubDate>
		</item>
		<item>
			<title>BigID Launches Partner Program</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4422:bigid-launches-partner-program&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Data protection startup BigID sets eyes on resellers with the Momentum VAR program, a first such program from the company aimed to encourage partners to add its data discovery and privacy offerings to their portfolio.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/BigID_Logo.jpg&quot; border=&quot;0&quot; alt=&quot;BigID&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company, the VAR program will help meet the need for privacy and compliance in more regulated verticals such as retail, communications, banking and insurance. As such, it should help customers deal with the growing number of privacy regulations in place around the ...</description>
			<category>Security</category>
			<pubDate>Thu, 19 Sep 2019 15:34:18 +0100</pubDate>
		</item>
		<item>
			<title>Barracuda Updates CloudGen Firewall</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4416:barracuda-updates-cloudgen-firewall&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Barracuda Networks announces Release 8 of CloudGen Firewall-- an update featuring functionality to streamline SD-WAN management, optimise cloud connectivity and automate scalable protection across multi-cloud deployments.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/barracudacloudgenfirewall.jpg&quot; border=&quot;0&quot; alt=&quot;Barracuda Cloudgen Firewall&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to a July 2019 Gartner report, “customer demands for simplicity, scalability, flexibility, low latency and pervasive security force convergence of the WAN edge and network security markets, creating the secure access service edge (SASE), with a predominantly cloud-b...</description>
			<category>Security</category>
			<pubDate>Fri, 13 Sep 2019 12:54:11 +0100</pubDate>
		</item>
		<item>
			<title>Industry Giants Team Up in Confidential Computing Consortium</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4395:industry-giants-team-up-in-confidential-computing-consortium&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Some of the biggest names in the industry-- including the likes of Google, IBM, Intel and Microsoft-- join the Linux Foundation to form the Confidential Computing Consortium (CCC), a community with a focus to advance trust and security for cloud and edge computing.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/cybersecurity-770x515.jpg&quot; border=&quot;0&quot; alt=&quot;Security&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
Initially the CCC has 10 members, namely Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent. Eventually it will bring together hardware vendors, cloud providers, developers, open source experts ...</description>
			<category>Security</category>
			<pubDate>Thu, 29 Aug 2019 15:21:39 +0100</pubDate>
		</item>
		<item>
			<title>IronNet Covers SMBs With IronDome</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4378:ironnet-covers-smbs-with-irondome&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Collective defense and network behavioural analysis provider IronNet Cybersecurity announces the IronDome collective defense platform is available for companies of all sizes, including small and midsize companies.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/irondome.jpg&quot; border=&quot;0&quot; alt=&quot;IronDome&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As the company puts it, SMBs are just as prone as cyber attacks as its current customer base of Fortune 500 companies. In addition, collaboration with a more diverse range of companies increases threat insight sharing, improves high-order analysis at the industry level, and enhances de...</description>
			<category>Security</category>
			<pubDate>Fri, 16 Aug 2019 13:55:39 +0100</pubDate>
		</item>
		<item>
			<title>Trend Micro Integrates XDR Across More Workloads</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4366:trend-micro-integrates-xdr-across-more-workloads&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Trend Micro now offers detection and response capabilities integrated across email, network, endpoint, server and cloud workloads, giving enterprises broader visibility of risk posture while connecting minor events from different security silos.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/trendmicroxdrintegrat.jpg&quot; border=&quot;0&quot; alt=&quot;Trend Micro XDR&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The result, the company says, allows customers to detect more complex attacks that otherwise remain unnoticed. After all, a 2018 SC Media survey, security teams receiver over 10000 security alerts daily, while the Verizon 2018 Data Breach Investigations...</description>
			<category>Security</category>
			<pubDate>Thu, 08 Aug 2019 15:33:01 +0100</pubDate>
		</item>
		<item>
			<title>Microsoft Intros Azure Security Center for IoT</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4359:microsoft-intros-azure-security-center-for-iot&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Microsoft looks to secure IoT and hybrid cloud workloads against evolving attacks with Azure Security Center for IoT, a product offering end-to-end security, from sensor to cloud, for both Microsoft and 3rd party devices.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/azuresecurityiot.jpg&quot; border=&quot;0&quot; alt=&quot;Azure IoT Security&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
According to Bain &amp; Company, the top concern for organisations considering IoT projects is security, leading to delays in IoT rollouts. IoT installations stretch from the smallest sensor through the network to the cloud, meaning piecemeal security products leave too many gaps...</description>
			<category>Security</category>
			<pubDate>Thu, 01 Aug 2019 15:39:54 +0100</pubDate>
		</item>
		<item>
			<title>Malware Turns Enterprise Search Engine into Zombie Botnet!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4352:malware-turns-enterprise-search-engine-into-zombie-botnet&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Elasticsearch is yet again under cybercriminal attack, as Trend Micro describes a vicious breed of malware able to turn the enterprise search engine into a cryptocurrency mining botnet able to deliver denial of service (DDoS) attacks.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/ZombieBotnet-640x353.jpg&quot; border=&quot;0&quot; alt=&quot;zombie botnet&quot; height=&quot;200&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As the security vendor puts it, the treats transform targets into &quot;botnet zombies.&quot; It targets exposed or publicly accessible out-of-date Elasticsearch databases/servers, and forces them to download a series of malicious Java commands from an expendable or easy-to...</description>
			<category>Security</category>
			<pubDate>Thu, 25 Jul 2019 15:38:55 +0100</pubDate>
		</item>
		<item>
			<title>Cloud Access Security from Symantec</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4341:cloud-access-security-from-symantec&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Symantec announces further cloud access security capabilities enabling enterprises to enforce consistent Zero Trust policies for users accessing SaaS applications, corporate applications in IaaS environments, cloud-based email and the internet.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/cloud-security.jpg&quot; border=&quot;0&quot; alt=&quot;Cloud Security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Part of the Integrated Cyber Defense Platform, the solutions not only provide access controls, but also add &quot;unique&quot; visibility and content scanning capabilities, allowing the enforcement of consistent DLP policies on information sent to cloud and web des...</description>
			<category>Security</category>
			<pubDate>Thu, 18 Jul 2019 15:26:08 +0100</pubDate>
		</item>
		<item>
			<title>Microsoft Exposes Astaroth Malware </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4333:microsoft-exposes-astaroth-malware-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The Microsoft Defender Advanced Threat Protection (ATP) team tells all about Astaroth, a particularly sneaky strain of malware with a fileless nature making it particularly difficult to detect.
Named after no one other than the Great Duke of Hell, Astaroth has been in circulation around S. America and Europe since at least late 2017. It is used to steal sensitive data via phishing attacks launched through spear-phishing. That sounds typical enough, but Astaroth is uniquely nasty since it does no...</description>
			<category>Security</category>
			<pubDate>Thu, 11 Jul 2019 15:26:57 +0100</pubDate>
		</item>
		<item>
			<title>Intego Reports on Mac Malware!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4324:intego-reports-on-mac-malware&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Researchers at security firm Intego discover a piece of Mac malware-- OSX/Linker, an attempt at taking over a recently disclosed zero-day flaw in the macOS Gatekeeper security functionality.
The security firm also points out another potential Mac vulnerability in OSX/CrescentCore, a next-generation fake Flash Player malware redesigned to evade antivirus detection.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/red-link-in-chain-OSX-Linker-600x300.jpg&quot; border=&quot;0&quot; alt=&quot;Intego Linker&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
Publicly disclosed by Filippo Cavallarin back in May 2019, the &quot;Mac OS X Gatekeeper Bypass&quot; is a vulnerability affecting Gatekeepe...</description>
			<category>Security</category>
			<pubDate>Thu, 04 Jul 2019 13:45:25 +0100</pubDate>
		</item>
		<item>
			<title>The 5 Champions in the Canalys Security Matrix </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4309:the-5-champions-in-the-canalys-security-matrix-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Canalys combines channel partner feedback and quarterly shipment estimates to declare Cisco, Sophos, Palo Alto Networks, Fortinet and ESET as Champions in the 2019 Cybersecurity Leadership Matrix.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/canalyssecuritymatrix.png&quot; border=&quot;0&quot; alt=&quot;Canalys matrix&quot; width=&quot;500&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
The Leadership Matrix assesses the channel performance of 15 security vendors over the past 12 months. The Champions have the highest scores in the Canalys vendor benchmark, and show characteristics such as positive partner sentiment, ongoing improvements in channel processes, a willingness to boost ...</description>
			<category>Security</category>
			<pubDate>Thu, 27 Jun 2019 15:16:22 +0100</pubDate>
		</item>
		<item>
			<title>StarLink Enters DACH Region</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4287:starlink-enters-dach-region&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Dubai-based security VAD StarLink sets a &quot;logical extension&quot; to the existing European Hub with plans to extend coverage across the DACH region for &quot;next generation security solutions.&quot;
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/starlink.jpg&quot; border=&quot;0&quot; alt=&quot;Starlink&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The security company is still to actually define the expansion into DACH, beyond the existing Netherlands and UK offices, but says it targets next-generation technologies to improve governance and combat evolving threats. It is also in line with a long-term vision to become the &quot;largest global True VAD,&quot; by develo...</description>
			<category>Security</category>
			<pubDate>Thu, 06 Jun 2019 15:20:37 +0100</pubDate>
		</item>
		<item>
			<title>LogRhythm Puts NextGen SIEM Platform on the Cloud</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4277:logrhythm-puts-nextgen-siem-platform-on-the-cloud&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The LogRhythm NextGen security information and event management (SIEM) platform takes to the cloud with the promise of full security monitoring, management and automation functionality only in SaaS form.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/securitycloud.jpg&quot; border=&quot;0&quot; alt=&quot;Security cloud&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company, LogRhythm Cloud is the full-fat SIEM platform, with the full breadth of log management, security analytics and out-of-the-box support for compliance automation and advanced threat detection. It also includes full security orchestration, automation and response (SOAR) ca...</description>
			<category>Security</category>
			<pubDate>Wed, 22 May 2019 15:13:05 +0100</pubDate>
		</item>
		<item>
			<title>The Next Intel Chip Vulnerability: ZombieLoad!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4263:the-next-intel-chip-vulnerability-zombieload&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Researchers warn the undead are making their way towards your customers' PCs-- or rather a set of critical vulnerabilities lurking within Intel processors allowing for the colourfully dubbed &quot;ZombieLoad&quot; attack.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/zombieload.png&quot; border=&quot;0&quot; alt=&quot;Zombieload&quot; width=&quot;550&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
Discovered by security researchers from Graz University of Technology, the ZombieLoad vulnerabilities affect all Intel chips dating back to 2011. The attack is similar to the Meltdown and Spectre flaws. Also known as Microarchitectural Data Sampling (MDS), ZombieLoad allows for the lea...</description>
			<category>Security</category>
			<pubDate>Wed, 15 May 2019 15:50:53 +0100</pubDate>
		</item>
		<item>
			<title>Kaseya Monitors Dark Web With ID Agent</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4257:kaseya-monitors-dark-web-with-id-agent&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Kaseya looks to monitor the dark web through the acquisition of threat intelligence and identity monitoring provider ID Agent. The financial details of the deal are not available.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/kaseya.png&quot; border=&quot;0&quot; alt=&quot;Kaseya&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;ID Agent products include the Dark Web ID dark web monitoring platform and BullPhish, a first-of-its-kind phishing simulator and security awareness training platform. Both join the Kaseya suite of infrastructure management security solutions to provide complete protection from cybercriminals, ransomware and other mali...</description>
			<category>Security</category>
			<pubDate>Thu, 09 May 2019 15:23:00 +0100</pubDate>
		</item>
		<item>
			<title>Flashpoint Boosts Intelligent Platform</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4236:flashpoint-boosts-intelligent-platform&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Business Risk Intelligence (BRI) specialist Flashpoint updates its Intelligence Platform with innovations and enhancements to help customers bolster security, confront fraud, detect insider threats and address 3rd party risk.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Flashpoint-CVE-Dashboard-1088X725.png&quot; border=&quot;0&quot; alt=&quot;Flashpoint intelligence platform&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The Flashpoint Intelligence Platform grants access to an archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, paste sites, technical data, card and account shops, and vulnerabilities, as a finished intelligence experience. The upd...</description>
			<category>Security</category>
			<pubDate>Thu, 25 Apr 2019 15:09:47 +0100</pubDate>
		</item>
		<item>
			<title>Sophos Boosts Public Cloud Visibility With Cloud Optix </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4221:sophos-boosts-public-cloud-visibility-with-cloud-optix-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Platform security vendor Sophos sets to address the security weaknesses of public clouds with Cloud Optix-- an agentless solution leveraging AI to highlight and mitigate threat exposure in cloud infrastructure.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/sophos-cloud-optix-sn.jpg&quot; border=&quot;0&quot; alt=&quot;Sophos Optix Cloud&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As the company puts it, Cloud Optix provides intelligent cloud visibility, automatic compliance regulation detection and threat response across multiple cloud environments. It also promises to reduce alert fatigue by pointing out what is &quot;truly meaningful and actionable,&quot; providing securi...</description>
			<category>Security</category>
			<pubDate>Thu, 11 Apr 2019 15:39:24 +0100</pubDate>
		</item>
		<item>
			<title>IDC: Banking, Manufacturing Boost European Security Market</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4210:idc-banking-manufacturing-boost-european-security-market&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to IDC, European spending on security hardware, software and services will reach $27.3 billion in 2019-- an 8.3% increase over 2018 driven by &quot;considerable&quot; investments in both emerging and traditional technologies.
Such growth should remain constant in the near future, since the analyst predicts spending by European companies should reach a CAGR of 7.2% over the 2018-2022 forecast period, totaling $33.6bn in 2022.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/idceuropeansecurity2019.jpg&quot; border=&quot;0&quot; alt=&quot;IDC Security spending Europe&quot; width=&quot;544&quot; height=&quot;366&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
The 3 industries driving European security spending in 2019 are bank...</description>
			<category>Security</category>
			<pubDate>Thu, 04 Apr 2019 15:27:43 +0100</pubDate>
		</item>
		<item>
			<title>A Backstory From Alphabet's Chronicle </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4165:a-backstory-from-alphabets-chronicle-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Chronicle, the security division of Google parent company Alphabet, announces a first product-- Backstory, a global telemetry platform the company describes as Google Photos, only for enterprise network security.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/chronicle_social.jpg&quot; border=&quot;0&quot; alt=&quot;Chronicle Backstory&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As Chronicle puts it, Backstory takes all the information within company infrastructure (be it in servers or employee devices) and indexes and organises it on the cloud. This allows customers to carry out searches the data, with the Chronicle analytics engine scanning for threats such a...</description>
			<category>Security</category>
			<pubDate>Thu, 07 Mar 2019 14:31:03 +0100</pubDate>
		</item>
		<item>
			<title>SPOILER: A Vulnerability in ALL Intel Core CPUs!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4163:spoiler-a-vulnerability-in-all-intel-core-cpus&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Researchers at the Worceseter Polytechnic Institute, Masschusetts, USA and the University of Lübeck, Germany warn of a new speculative execution security flaw present in modern Intel Core processors.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/29992-48887-ntel-top-l.jpg&quot; border=&quot;0&quot; alt=&quot;Intel processor&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Dubbed &quot;SPOILER&quot; (or &quot;Speculative Load Hazards Boost Rowhammer and Cache Attacks&quot;), the flaw potentially allows attackers to extract passwords, keys and other data from memory using malicious JavaScript in a web browser. As such it is reminiscent of the Spectre vulnerabilities discovered earlier la...</description>
			<category>Security</category>
			<pubDate>Wed, 06 Mar 2019 15:01:24 +0100</pubDate>
		</item>
		<item>
			<title>Symantec Adds Partners to Integrated Cyber Defense Platform</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4159:symantec-adds-partners-to-integrated-cyber-defense-platform&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Symantec announces the addition of over 120 companies to the Integrated Cyber Defense (ICD) platform, including big names such as AWS, Box, IBM Security, Microsoft, Oracle, Service Now and Splunk.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/symantec-icd-1088x725.png&quot; border=&quot;0&quot; alt=&quot;Symantec ICD&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As Symantec puts it, such an industry collaboration reflects a &quot;platform shift&quot; in the security industry, as more enterprise customers are looking to consolidate vendors and adopt more integrated platforms backed by an open ecosystem. The company adds &quot;important innovations&quot; will make the shift even ea...</description>
			<category>Security</category>
			<pubDate>Thu, 28 Feb 2019 14:27:06 +0100</pubDate>
		</item>
		<item>
			<title>K2 Cyber Security Determines Threat Detection</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4149:k2-cyber-security-determines-threat-detection&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>K2 Cyber Security emerges from stealth mode to present what it describes as the first deterministic approach for protecting hybrid clouds against sophisticated attacks-- a technology dubbed Optimised Control Flow Integrity (CFI).
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/K2_Cyber_1088x725.png&quot; border=&quot;0&quot; alt=&quot;K2 Cyber Security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As K2 puts it, CFI ensures an application executes only as designed, enabling real-time attack detection with no false positives, regardless of application patch status. The company adds dynamic, workload identity-based micro-segmentation prevents the lateral movement o...</description>
			<category>Security</category>
			<pubDate>Fri, 22 Feb 2019 14:27:02 +0100</pubDate>
		</item>
		<item>
			<title>Container Vulnerability Allows Access to Host OS!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4136:container-vulnerability-allows-access-to-host-os&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Researchers warn of a serious vulnerability in container technology-- one possibly allowing attackers to enable malicious containers to escape the confines of the isolated process segment, gaining access to the host operating system in the process.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/container-security-nist.jpg&quot; border=&quot;0&quot; alt=&quot;container security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;&quot;The vulnerability allows a malicious container to (with minimal user interaction) overwrite the host runc binary and thus gain root-level code execution on the host,&quot; SUSE senior engineer Aleksa Sarai writes in an advisory.
Dubbed CVE-2019-5736, the...</description>
			<category>Security</category>
			<pubDate>Thu, 14 Feb 2019 16:23:36 +0100</pubDate>
		</item>
		<item>
			<title>Dell Boosts Endpoint Security With Secureworks, CrowdStrikes</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4126:dell-boosts-endpoint-security-with-secureworks-crowdstrikes&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Dell brings together the management security, incident response expertise and threat behavioural analytics of Secureworks with the CrowdStrike unified endpoint protection platform in a next-gen endpoint security solution portfolio, SafeGuard and Response.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/SafeGuard-and-Response-Solutions-From-Dell.jpg&quot; border=&quot;0&quot; alt=&quot;Dell endpoint security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As the company puts it, the approach is designed to prevent, detect and respond to the shofting threat landscape, making it easy for organisation to protect data with the most secure commercial PCs. CrowdStrike endpoint security solutions promi...</description>
			<category>Security</category>
			<pubDate>Thu, 07 Feb 2019 16:23:03 +0100</pubDate>
		</item>
		<item>
			<title>Symantec Boosts Endpoint Defence</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4122:symantec-boosts-endpoint-defence&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The Symantec endpoint security portfolio receives further enhancements with offerings incorporating advanced protection and hardening to deliver coordinated, adaptive endpoint defense able to reduce attack surface.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/489045-symantec-endpoint-protection-logo.jpg&quot; border=&quot;0&quot; alt=&quot;Symantec endpoint&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The result, the company claims, also delivers such technologies through a single agent customers can manage through an integrated cloud console, lowering deployment and management complexity. The portfolio updates include Endpoint Application Control, a means to defend against advanc...</description>
			<category>Security</category>
			<pubDate>Fri, 01 Feb 2019 14:30:38 +0100</pubDate>
		</item>
		<item>
			<title>Sonrai Security Launches Cloud Data Control Service</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4103:sonrai-security-launches-cloud-data-control-service&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Startup Sonrai Security emerges from stealth with $18.5 million in funding and the launch of Cloud Data Control (CDC), a service promising &quot;unparalleled data and identity control across all cloud accounts and within any data store.&quot;
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Sonrai.png&quot; border=&quot;0&quot; alt=&quot;Sonrai&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Named after the Galic word for &quot;data&quot; (pronounced &quot;son-ree&quot;), Sonrai is founded by Q1 Labs co-founders Brendan Hanningan and Sandy Bird. Following the 2011 acquisition of Q1 Labs by IBM, the two helped establish IBM Security with QRadar, the Big Blue flagship securit...</description>
			<category>Security</category>
			<pubDate>Thu, 17 Jan 2019 14:34:05 +0100</pubDate>
		</item>
		<item>
			<title>Sophos Buys Avid Secure</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4093:sophos-buys-avid-secure&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Sophos sets to bolster its cloud security capabilities with the acquisition of Avid Secure, a next-generation cloud infrastructure company. Financial details of the deal are not available.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/avidsecure.png&quot; border=&quot;0&quot; alt=&quot;Avid Secure&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Founded in 2017, Avid Secure offers an cloud security analytics, compliance and DevSecOps platform to provide end-to-end protection in public cloud environments such as AWS, Azure and Google. It uses artificial intelligence and automation to address challenges involved with cloud security, including lack of wo...</description>
			<category>Security</category>
			<pubDate>Thu, 10 Jan 2019 16:08:19 +0100</pubDate>
		</item>
		<item>
			<title>Microsoft Furthers Password-Free Future</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4059:microsoft-furthers-password-free-future&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The Windows 10 October update brings more capabilities to Windows Hello, the Microsoft login system-- now offering not only facial recognition, fingerprint or PIN, but also support for USB or NFC FIDO2 devices.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/microsoftwindowshellosecurity.jpg&quot; border=&quot;0&quot; alt=&quot;Windows Hello security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As a Microsoft blogpost insists, &quot;passwords can be difficult to remember, are often reused and can be used to hack your account anywhere, anytime, from any device.&quot; Windows Hello already sidesteps the need for a password through facial recognition or fingerprint readers, while the Windows...</description>
			<category>Security</category>
			<pubDate>Wed, 21 Nov 2018 17:04:39 +0100</pubDate>
		</item>
		<item>
			<title>Wifi APs Reveal Bleedingbit Vulnerabilities</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4034:wifi-aps-reveal-bleedingbit-vulnerabilities&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Wireless access points from multiple vendors pose the risk of two severe vulnerabilities dubbed Bleedingbit, IoT security firm Armis warns-- both providing attackers means to sneak into enterprise networks undetected.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/bleedingbit-1088x725.png&quot; border=&quot;0&quot; alt=&quot;Bleedingbit&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The Bleedingbit flaws are found in Texas Instruments Bluetooth Low Energy (BLE) chips used Cisco, Meraki and Aruba wifi APs. Neither vulnerability can be detected or stopped by traditional network and endpoint security solutions, and if exploited they allow attackers to break into ...</description>
			<category>Security</category>
			<pubDate>Fri, 02 Nov 2018 11:20:23 +0100</pubDate>
		</item>
		<item>
			<title>Spiceworks: 25% of Companies Do Not Test Disaster Recovery Plans</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4029:spiceworks-25-of-companies-do-not-test-disaster-recover-plans&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Are companies prepared in the case disaster strikes? According to Spiceworks, while 95% of organisations have a disaster recovery plan in place, 23% never test if the plan actually, well, works.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/disaster-recovery-plan-ts-100662705-primary.idge.jpg&quot; border=&quot;0&quot; alt=&quot;Disaster recovery&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The findings come from an August 2018 survey of 762 respondents from companies across Europe and N. America, and covers the financial impact of outages within said companies. It shows how among the organisation not testing their plan, 61% cite inadequate time, 53% cite inadequate resources and 34% say di...</description>
			<category>Security</category>
			<pubDate>Fri, 26 Oct 2018 14:10:50 +0100</pubDate>
		</item>
		<item>
			<title>Trend Micro Intros Apex One Endpoint Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4019:trend-micro-intros-apex-one-endpoint-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Trend Micro describes Apex One as the evolution of its enterprise endpoint security efforts, bringing enhanced automated detection and response together with actionable insights in a single agent.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Trend_Micro_-_Logo.jpg&quot; border=&quot;0&quot; alt=&quot;Trend Micro&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;“Our latest release has advancements that address the most pressing endpoint security issues being faced in the industry today,” the company says. “Despite the claims of some so-called ‘next-gen’ vendors, effective protection requires multiple layers of security, which is foundational to our ...</description>
			<category>Security</category>
			<pubDate>Fri, 19 Oct 2018 10:31:25 +0100</pubDate>
		</item>
		<item>
			<title>IDC: Security Demands Drive Future Spending</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=4007:idc-security-demands-drive-future-spending&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to IDC, global security spending is to reach $133.7 billion by 2022 with a CAGR of 9.9% over the 2017-2022 period-- meaning spending in 2022 will be 45% greater than the $92.1bn forecast for 2018.
&quot;Privacy has grabbed the attention of Boards of Directors as regions look to implement privacy regulation and compliance standards similar to GDPR. Frankly, privacy is the new buzz word and the potential impact is very real,&quot; the analyst says. &quot;The result is that demand to comply with such st...</description>
			<category>Security</category>
			<pubDate>Fri, 12 Oct 2018 09:29:05 +0100</pubDate>
		</item>
		<item>
			<title>BlackBerry Claims Quantum-Resistant Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3992:blackberry-claims-quantum-resistant-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>BlackBerry announces the latest addition to its selection of cryptography tools-- quantum-resistant code signing software, allowing &quot;software to be digitally signed using a scheme that will be hard to break with a quantum computer.&quot;
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/BlackBerry.Quantum2.jpg&quot; border=&quot;0&quot; alt=&quot;Blackberry Quantum&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Developed in collaboration with Isara Corporation, a specialist in &quot;agile quantum-safe security solutions,&quot; the solution promises to future-proof the security of long-lived assets (such as systems in critical infrastructure, industrial controls, aerospace and militar...</description>
			<category>Security</category>
			<pubDate>Fri, 05 Oct 2018 15:01:06 +0100</pubDate>
		</item>
		<item>
			<title>Yubico Adds FIDO2 Support to Security Keys</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3988:yubico-adds-fido2-support-to-security-keys&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Security key specialist Yubico announces the YubiKey 5 series-- a set of 4 multi-protocol security keys with features including support for the FIDO2 standard and NFC capability.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/yuico_5.jpg&quot; border=&quot;0&quot; alt=&quot;Yubico 5&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Yubico is actually one of the companies behind the&lt;a href=&quot;http://www.it-sp.eu/index.php?option=com_content&amp;view=article&amp;id=3760:fido-and-w3c-authenticate-with-webauthn&amp;catid=38:security&amp;Itemid=74&quot; target=&quot;_blank&quot;&gt; FIDO2 specification&lt;/a&gt; (and the W3C-developed WebAuthn component). All platforms and browsers either support or are engaged in the standards work, allowing for authentication through devices such as the YubiKey, with or without a username and password.
YubiKey 5 devices s...</description>
			<category>Security</category>
			<pubDate>Thu, 27 Sep 2018 13:30:07 +0100</pubDate>
		</item>
		<item>
			<title>BitSight Predicts the Future With Forecasting</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3955:bitsight-predicts-the-future-with-forecasting&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>BitSight sets to provide direct visibility into the current and future security program of a customer with Forecasting, a service the company describes as a first analytics offering in the security rating services industry.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/bitsightsecurity.jpg&quot; border=&quot;0&quot; alt=&quot;BitSight security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company, Forecasting leverages &quot;unique&quot; risk and security analytics a based on data collected from &quot;hundreds of thousands&quot; of organisations making part of the BitSight ecosystem to model various security scenarios. Thus, they can analyse questions on how to s...</description>
			<category>Security</category>
			<pubDate>Fri, 07 Sep 2018 10:39:47 +0100</pubDate>
		</item>
		<item>
			<title>Gartner: Detection, Response, Privacy Drive Security Demand</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3930:gartner-detection-response-privacy-drive-security-demand&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Global spending on security products and services is to reach over $114 billion in 2018, Gartner reports-- a 12.4% increase over 2017, with the market growth further (specifically by 8.7%) in 2019 to reach $124bn.
&quot;Security leaders are striving to help their organisations securely use technology platforms to become more competitive and drive growth for the business,&quot; the analyst says. &quot;Persisting skills shortages and regulatory changes like the EU’s Global Data Protection Regulation (GDPR) are...</description>
			<category>Security</category>
			<pubDate>Fri, 17 Aug 2018 15:12:22 +0100</pubDate>
		</item>
		<item>
			<title>WatchGuard Updates Fireware OS</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3924:watchguard-updates-fireware-os&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>WatchGuard Technologies launches an update of the software powering its Firebox Unified Security Platform appliances-- Fireware version 12.2, now with an artificial intelligence engine able to predict, detect and block zero-day malware.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/fireboxes.jpg&quot; border=&quot;0&quot; alt=&quot;Firebox&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Dubbed IntelligentAV, the antivirus scan service joins the Threat Detection and Response (TDR), Gateway AntiVirus, and APT Blocker features as an additional layer of industry-leading malware defense on the Firebox platform. It is based on Cylance malware detectio...</description>
			<category>Security</category>
			<pubDate>Fri, 10 Aug 2018 13:55:57 +0100</pubDate>
		</item>
		<item>
			<title>Cisco Acquires Duo Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3910:cisco-acquires-duo-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Cisco announces the $2.35 billion acquisition of Duo Security, a Michigan-based provider of unified access security and multi-factor authentication delivered through the cloud.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/ciscoduosecurity.jpg&quot; border=&quot;0&quot; alt=&quot;Cisco Duo&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Founded in 2010 by Dug Song and Jonathan Oberheie, Duo Security sells solutions for the verification of user identity and device health before granting access to applications. As such, the integration of Cisco network, device and cloud security platforms with Duo Security zero-trust authentication and access products shou...</description>
			<category>Security</category>
			<pubDate>Fri, 03 Aug 2018 13:06:19 +0100</pubDate>
		</item>
		<item>
			<title>Homeland Security Warns of Oracle, SAP Vulnerabilities</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3902:homeland-security-warns-of-oracle-sap-vulnerabilities&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The Department of Homeland Security issues an alert of potential vulnerabilities in Oracle and SAP enterprise resource planning (ERP) software, following a report from security firms Onapsis and Digital Shadows.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/oraclesapvulnerable.jpg&quot; border=&quot;0&quot; alt=&quot;Oracle sap security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The security firms state firms in the UK, US and Germany are at most risk from the threat-- and warn state-sponsored actors and hacktivists groups are targeting ERP applications used by large businesses to steal sensitive data, such as financial results, manufacturing secrets and credit ...</description>
			<category>Security</category>
			<pubDate>Fri, 27 Jul 2018 15:18:04 +0100</pubDate>
		</item>
		<item>
			<title>MobileIron Adds MFA to Cloud Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3866:mobileiron-adds-mfa-to-cloud-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Cloud security and mobile app distribution software specialist MobileIron launches MobileIron Authenticator-- a mobile app turning the phone into a second factor of authentication, further boosting organisation security.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/MobileIron.logo.jpg&quot; border=&quot;0&quot; alt=&quot;MobileIron&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company, MobileIron Authenticator differs from existing MFA (multi-factor authentication) platforms through a one-touch setup process for end users, as well as the use of smartphones instead of hardware tokens. It also integrates MFA into a comprehensive securit...</description>
			<category>Security</category>
			<pubDate>Thu, 28 Jun 2018 15:27:29 +0100</pubDate>
		</item>
		<item>
			<title>Trend Micro Intros Managed Detection and Response</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3858:trend-micro-intros-managed-detection-and-response&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Trend Micro announces the Managed Detection and Response (MDR) service, together with the addition of multiple AI-powered capabilities across the entire Trend Micro product portfolio.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Trend-Micro-1088x725.png&quot; border=&quot;0&quot; alt=&quot;Trend Micro MDR&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The MDR service is aimed at organisations lacking in security staff. It is enabled through sensors built into Trend Micro endpoint, network and server offerings across an environment. The sensors deliver data to the service, which correlates alerts from multiple sources to automatically identify the source of an at...</description>
			<category>Security</category>
			<pubDate>Fri, 22 Jun 2018 15:21:43 +0100</pubDate>
		</item>
		<item>
			<title>MagicCube Enters Europe With Pin-on-Glass Solutions</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3838:magiccube-enters-europe-with-pin-on-glass-solutions&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The Money 20/20 Europe event sees the MagicCube enter European markets with a product suite including MC-Token Shield and MC-Screen Shield, capable of replacing the hardware security needs of point of sales systems.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/MagicCube.png&quot; border=&quot;0&quot; alt=&quot;MagicCube&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The MagicCube European presence comes complete with a branch office in Munich headed by Ingo Tänzler, who previously worked at Giesecke &amp; Devrient.
MagicCube technology transforms regular mobile devices into &quot;secure, full-featured POS systems.&quot; It allows consumer devices with touch...</description>
			<category>Security</category>
			<pubDate>Fri, 08 Jun 2018 15:42:08 +0100</pubDate>
		</item>
		<item>
			<title>Ultimaco Buys Micro Focus' Atalla </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3816:ultimaco-buys-micro-focus-atalla-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Hardware Security Module (HSM) maker Ultimaco looks to boost its position in finacial services with the acquisition of the Atalla HSM and enterprise secure key manager (ESKM) business lines from Micro Focus.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/atallahsm.jpg&quot; border=&quot;0&quot; alt=&quot;Atalla HSM&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Germany-based Ultimaco says the deal allows it to address demand for merging payment functionality with general purpose needs. The Atalla HSM offering protects sensitive data and keys for non-cash retail payments, carholder authentication and cryptographic keys. Meanwhile the ESKM tool provi...</description>
			<category>Security</category>
			<pubDate>Fri, 25 May 2018 15:17:51 +0100</pubDate>
		</item>
		<item>
			<title>The True Cost of Ransomware Isn’t the Ransom, It’s the Recovery: Seven BDR Pitfalls to Avoid </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3800:the-true-cost-of-ransomware-isnt-the-ransom-its-the-recovery-seven-bdr-pitfalls-to-avoid-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>by Paul Balkwell, Vice President of International Sales, Continuum
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/paul-balkwell[1].jpg&quot; border=&quot;0&quot; alt=&quot;Paul Balkwell&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Global ransomware damage costs are skyrocketing, &lt;a href=&quot;https://cybersecurityventures.com/ransomware-damage-report-2017-part-2/&quot; target=&quot;_blank&quot;&gt;reported&lt;/a&gt; to exceed £10 billion by 2019. But, it may surprise organisations to learn that ransom payouts could be the least of all damage cost contributors. The real financial injury is in the post-attack disruption to a business’ operations and productivity.
With a comprehensive business continuity plan in place, an organisation has a better chance of significantly reducing dow...</description>
			<category>Security</category>
			<pubDate>Fri, 11 May 2018 13:35:32 +0100</pubDate>
		</item>
		<item>
			<title>Tufin Launches Technology Alliance Partner Program</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3785:tufin-launches-technology-alliance-partner-program&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Security provider Tufin announces the Technology Alliance Partner (TAP) Program-- an initiative to make the Tufin Orchestration Suite more compatible with Tufin REST APIs.
The program already has a first set of members, with Cybereason, Cyber Observer, DFLabs, Reposify and Swimlane. Tufin Orchestration Suite will initially address four critical use cases, namely security incident enrichment, security incident response, compliance and risk assessment....</description>
			<category>Security</category>
			<pubDate>Fri, 27 Apr 2018 10:38:49 +0100</pubDate>
		</item>
		<item>
			<title>Sophos and the Dirty Secrets of Firewalls</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3774:sophos-and-the-dirty-secrets-of-firewalls&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>British security vendor Sophos has a few &quot;dirty secrets&quot; to reveal on the state of firewalls in enterprise-- IT managers cannot identify 45% of network traffic, and 25% of managers cannot identify 70% of traffic.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/firewalls.jpg&quot; border=&quot;0&quot; alt=&quot;Firewalls&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Such findings come from &quot;The Dirty Secrets of Network Firewalls,&quot; a global survey of 2700 IT decision makers from mid-size businesses in 10 countries, including the France, Germany, UK, US, Canada, Australia, Japan, India and S. Africa. It shows 84% of respondents agree a lack of applic...</description>
			<category>Security</category>
			<pubDate>Fri, 20 Apr 2018 14:49:42 +0100</pubDate>
		</item>
		<item>
			<title>FIDO and W3C Authenticate With WebAuthn</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3760:fido-and-w3c-authenticate-with-webauthn&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The FIDO (Fast Identity Online) Alliance and the World Wide Web Consortium (W3C) announce a &quot;major standards milestone&quot; with Web Authentication (WebAuthn)-- a password-free protocol currently in Candidate Recommendation (CR) stage.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/FIDO2-1088x725.png&quot; border=&quot;0&quot; alt=&quot;FIDO &quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;WebAuthn is a standard web API allowing users to securely authenticate online, in the browser and across sites and devices. It is a core component of the FIDO2 specification project (the next generation of the U2F and UAF standards) together with the Client to Authent...</description>
			<category>Security</category>
			<pubDate>Fri, 13 Apr 2018 15:24:29 +0100</pubDate>
		</item>
		<item>
			<title>IDC: 2018 Security Spending to Reach $91bn</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3741:idc-2018-security-spending-to-reach-91bn&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Global security-related hardware, software and services software will reach $91.4 billion in 2018, IDC reports-- a 10.2% increase over 2017, with such growth set to continue over the next few years.
Security spending should reach a CAGR of 10% over the 2016-2021 forecast period, growing to a total of $120.7bn in 2021.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/idc2018securityspending.jpg&quot; border=&quot;0&quot; alt=&quot;IDC security&quot; width=&quot;548&quot; height=&quot;466&quot; style=&quot;vertical-align: middle; margin: 10px;&quot; /&gt;
&quot;Banks, discrete manufacturers, especially within the high-tech sector, and the federal government are spending the most on security to avoid large scale cyber-attacks and adher...</description>
			<category>Security</category>
			<pubDate>Thu, 29 Mar 2018 13:45:54 +0100</pubDate>
		</item>
		<item>
			<title>Juniper: Medium-Size Businesses to Spend More on Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3732:juniper-medium-size-businesses-to-spend-more-on-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to Juniper Research, global spending on security solutions will grow by 33% over the next 4 years to reach $134 billion annually by 2022, with medium-size businesses driving good part of the spending.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Small-Business-Security_-Keeping-Data-Safe-in-the-Cloud-720x480.jpg&quot; border=&quot;0&quot; alt=&quot;Small business security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Around 70% of 2022 spending is to come from medium-size businesses, the result of cybercriminals targeting &quot;low-hanging fruit.&quot; That said, hitting such fruit still leads to big losses, since Juniper estimates the cumulative costs of data breaches for the 2017-2022 period will reach $8 tri...</description>
			<category>Security</category>
			<pubDate>Fri, 23 Mar 2018 16:23:34 +0100</pubDate>
		</item>
		<item>
			<title>Flaws Found in AMD Server Processors</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3722:flaws-found-in-amd-server-processors&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Israeli security firm CTS Labs announces the discovery of no less than 13 critical security vulnerabilities and manufacturer backdoors in AMD EPYC, Ryzen, Ryzen Pro and Ryzen Mobile processors.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/amd-chip-800x319.jpg&quot; border=&quot;0&quot; alt=&quot;AMD Chip&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The flaws potentially allow attackers to run malware that is not only nearly impossible to detect, but also provides direct access to the most (supposedly) secure part of the processor, namely the part storing sensitive data such as passwords and encryption keys. Taking advantage of most of the vulnerabil...</description>
			<category>Security</category>
			<pubDate>Fri, 16 Mar 2018 14:26:15 +0100</pubDate>
		</item>
		<item>
			<title>Gartner on How to Deal With Spectre and Meltdown</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3695:gartner-on-how-to-deal-with-spectre-and-meltdown&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/meltdown-spectre-logos.jpg&quot; border=&quot;0&quot; alt=&quot;Meltdown Spectre&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Security and risk management leaders must take a pragmatic and risk-based approach to dealing with Spectre and Meltdown, Gartner says-- after all, not all software and processors are vulnerable to the threats in the same way.
&quot;[T]he risk will vary based on the system's exposure to running unknown and untrusted code,&quot; the analyst continues. &quot;The risk is real, but with a clear and pragmatic risk-based remediation plan, security and risk management leaders can provide business leaders with confiden...</description>
			<category>Security</category>
			<pubDate>Fri, 23 Feb 2018 14:28:02 +0100</pubDate>
		</item>
		<item>
			<title>Alphabet Spins Off Security Company</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3678:alphabet-spins-off-security-company&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>In a further bid to branch out of search Alphabet, the parent company of Google, spins off its security unit into Chronicle-- a standalone company with aim to deliver high-end security analytics services.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/chronicle.jpg&quot; border=&quot;0&quot; alt=&quot;Chronicle&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Born out of the Google X moonshot group, Chronicle is lead by former Symantec COO (and Starbucks CIO) Stephen Gillett. Google hardware powers its two first offerings. One is an enterprise security intelligence and analytics platform, while the other is VirusTotal, the online malware and virus s...</description>
			<category>Security</category>
			<pubDate>Fri, 26 Jan 2018 15:55:41 +0100</pubDate>
		</item>
		<item>
			<title>Spectre Patch Affects New Core Chips After All</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3665:spectre-patch-affects-new-core-chips-after-all&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Intel eats back &lt;a href=&quot;http://www.it-sp.eu/index.php?option=com_content&amp;view=article&amp;id=3662:spectre-and-meltdown-fixes-cause-pc-slowdowns&amp;catid=38:security&amp;Itemid=74&quot; target=&quot;_blank&quot;&gt;the words it said earlier this month&lt;/a&gt; as it admits newer Skylake and Kaby Lake CPUs are also affected by the patch released to fix the issues brought about Spectre and Meltdown.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/intellogobig.jpg&quot; border=&quot;0&quot; alt=&quot;Intel logo&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to a company blog post, while the firmware updates are &quot;effective at mitigating exposure to the security issues,&quot; they also lead to more frequent reboots. Previously Intel insisted the issue was only noticeable on systems running on older Broadwell and Haswell CPUs, but tests have confirmed simil...</description>
			<category>Security</category>
			<pubDate>Thu, 18 Jan 2018 16:47:45 +0100</pubDate>
		</item>
		<item>
			<title>Spectre and Meltdown Fixes Cause PC Slowdowns?</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3662:spectre-and-meltdown-fixes-cause-pc-slowdowns&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>As the industry figures out how to fix Spectre and Meltdown-- the two security issues affecting the processors powering just about every PC, server and mobile device-- news emerges on how the fixes might negatively hit the performance of said devices.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/meltdown-spectre-logos.jpg&quot; border=&quot;0&quot; alt=&quot;Meltdown Spectre&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;In case anyone is in need of background, the ominously named Spectre (dubbed so because of the root cause, speculative execution) and Meltdown (since it melts security boundaries normally enforced by hardware) were discovered by security researcher...</description>
			<category>Security</category>
			<pubDate>Fri, 12 Jan 2018 16:28:50 +0100</pubDate>
		</item>
		<item>
			<title>Gartner: 2018 Security Spending to Reach $96bn</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3651:gartner-2018-security-spending-to-reach-96bn&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to Gartner global security spending will reach $96.3 billion in 2018-- an 8% increase over 2017, driven by regulations, shifting buyer mindset, emerging threats and the evolution to a digital business strategy.
&quot;Overall, a large portion of security spending is driven by an organisation's reaction toward security breaches as more high profile cyberattacks and data breaches affect organisations worldwide,&quot; the analyst says. &quot;Cyberattacks such as WannaCry and NotPetya, and most recently t...</description>
			<category>Security</category>
			<pubDate>Fri, 22 Dec 2017 16:12:27 +0100</pubDate>
		</item>
		<item>
			<title>Cisco Rolls Out Security Connector iOS App</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3638:cisco-rolls-out-security-connector-ios-app&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Cisco releases another result of its partnership with Apple-- Security Connector, an iOS app the company describes as a &quot;first of its kind enterprise security solution&quot; for iDevices.
Security Connector monitors network traffic generated by users and applications. Designed for company-owned iDevice running in supervise mode, it makes things easier for admins, since they only need to provision a single app even as it supports two extensions, Umbrella and Clarity....</description>
			<category>Security</category>
			<pubDate>Fri, 15 Dec 2017 16:00:48 +0100</pubDate>
		</item>
		<item>
			<title>Cherry Adds Fingerprint Reader to MC 4900 Mouse</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3623:cherry-adds-fingerprint-reader-to-mc-4900-mouse&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Peripheral maker Cherry announces the MC 4900-- a mouse featuring an integrated fingerprint reader compatible with Windows Hello, making it ideal for customers wanting an easy biometric authentication solution.
Aimed mainly at office and business environments, the MC 4900 features an ambidextrous 3-button design complete with rubberised side panels and a wide scroll wheel. The optical sensor offers a sampling rate of 1375 DPI, while a 1.8m USB cable handles connectivity....</description>
			<category>Security</category>
			<pubDate>Thu, 07 Dec 2017 16:51:45 +0100</pubDate>
		</item>
		<item>
			<title>IDC: Security Spending to Reach $120bn in 2021</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3598:idc-security-spending-to-reach-120bn-in-2021&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to IDC global spending on security-related hardware, software and services will reach $119.9 billion in 2021 with a CAGR of 9.6% over the 2016-2021 forecast period.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/TECH1-secure-060816-AP.jpg&quot; border=&quot;0&quot; alt=&quot;Security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;As for 2017, spending on security products and services is to reach $83.5bn, a 10.3% increase over 2016.
&quot;Three overarching trends are driving security spending-- a dynamic threat landscape, increasing regulatory pressures, and architectural changes spurred by digital transformation initiatives,&quot; the analyst remarks. &quot;Whil...</description>
			<category>Security</category>
			<pubDate>Fri, 20 Oct 2017 14:53:21 +0100</pubDate>
		</item>
		<item>
			<title>Akamai Fights Bots With Bot Manager Premier</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3587:akamai-fights-bots-with-bot-manager-premier&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Akamai announces an addition to the Cloud Security portfolio-- Bot Manager Premier, a means for organisations to manage the impact of bots across websites, mobile applications and web API.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/akamai-bot-manager.jpg&quot; border=&quot;0&quot; alt=&quot;Akamai bot manager&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to a Ponemon Institute survey commissioned by Akamai, 54% of respondents report an increase in both number and severity of credential stuffing attacks. Making matters worse, 68% of respondents lack visibility into credential stuffing attacks, while 70% believe existing solutions are not sufficient to...</description>
			<category>Security</category>
			<pubDate>Fri, 13 Oct 2017 13:01:53 +0100</pubDate>
		</item>
		<item>
			<title>LMNTRIX Brings Ian Murphy as EMEA VP</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3562:lmntrix-brings-ian-murphy-as-emea-vp&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>LMNTRIX-- the latest brainchild of Carlo Minassian, founder of MSSP pioneer earthwave-- names industry veteran Ian Murphy as vice president leading its EMEA business.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/IanMurphy_LMNTRIX-edit.jpg&quot; border=&quot;0&quot; alt=&quot;Ian Murphy&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Murphy has almost 25 years of experience in both private and public sectors. His employers include the UK Ministry of Defence, Symantec and, most recently, DXC Technology, where he was lead security architect. In addition he also worked with multiple channel organisations, including CSC and Dimension Data.
“There’s such a stro...</description>
			<category>Security</category>
			<pubDate>Fri, 22 Sep 2017 15:25:11 +0100</pubDate>
		</item>
		<item>
			<title>Malware Found in CCleaner Software!</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3557:malware-found-in-ccleaner-software&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Piriform admits legitimate downloads of its CCleaner software carry a &quot;multi-stage malware payload&quot;-- essentially a backdoor allowing hackers to install ransomware or keyloggers to further infect PCs.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/ccleaner-02-1024x576.png&quot; border=&quot;0&quot; alt=&quot;CCLeaner&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;According to the company around 2.27 million users ran the affected software (specifically CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191) following download from a hacked server. The company says the situation could have been a lot worse, since CCleaner gets around 5 million new u...</description>
			<category>Security</category>
			<pubDate>Thu, 21 Sep 2017 15:23:03 +0100</pubDate>
		</item>
		<item>
			<title>Juniper Buys Cyphort</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3541:juniper-buys-cyphort&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Juniper boosts its Sky advanced threat prevention (ATP) through the acquisition of Cyphort, a startup specialised in security analytics for advanced threat defense.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/juniper-100706729-large.jpg&quot; border=&quot;0&quot; alt=&quot;Juniper networks&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Financial details of the deal are not available.
Cyphort offers an open-architecture platform complete with a machine learning-powered analytics engine. It integrates with existing security tools to help mid-size and large enterprises find threats able to bypass first-line security efforts. Post-acquisition, Cyphort technology will ...</description>
			<category>Security</category>
			<pubDate>Fri, 01 Sep 2017 14:11:08 +0100</pubDate>
		</item>
		<item>
			<title>Successful Real World Test for 4D Quantum Encryption </title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3532:successful-real-world-test-for-4d-quantum-encryption-&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Researchers at the University of Ottawa manage to send a message with high-dimensional quantum encryption between two building rooftops, marking a first successful test for the transmission of such signals.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/FS_optica5-1quantumtest.jpg&quot; border=&quot;0&quot; alt=&quot;Quantum transmission&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Quantum encryption uses photons to encode information as quantum buts. The simplest form of quantum encryption is 2D, where each photon encodes one bit (either 1 or 0), but a photon can encode even more information, making &quot;high-dimensional quantum encryption.&quot; The scheme used by the Universi...</description>
			<category>Security</category>
			<pubDate>Fri, 25 Aug 2017 13:36:25 +0100</pubDate>
		</item>
		<item>
			<title>Gartner: Security Spending Grows to $86.4bn in 2017</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3521:gartner-security-spending-grows-to-864bn-in-2017&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>According to Gartner global spending on security products and services is to reach $86.4bn in 2017-- a 7% increase over 2016, before growing to $93bn in 2018.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/TECH1-secure-060816-AP.jpg&quot; border=&quot;0&quot; alt=&quot;Security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The analyst predicts fast growth in the security testing market (if from a small base), the result of continued data breaches and growing demands for application security testing as part of DevOps. Spending on emerging application security testing tools, particularly interactive application security testing (IAST), should contribute to fur...</description>
			<category>Security</category>
			<pubDate>Fri, 18 Aug 2017 14:25:55 +0100</pubDate>
		</item>
		<item>
			<title>Passwords: What if Everything You Know Is Wrong?</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3520:passwords-what-if-everything-you-know-is-wrong&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>by Shelly Palmer, CEO, The Palmer Group
 &lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/shelly-RTC-38.jpg&quot; border=&quot;0&quot; alt=&quot;Shelly Palmer&quot; width=&quot;250&quot; height=&quot;208&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Every time there’s a notable cybersecurity breach, someone (even me) writes a comprehensive primer on the proper way to create “secure” passwords. Lather, rinse, repeat. Until a few years ago, everyone (including me) based their password advice on a 2003 paper from the National Institute of Standards and Technology (NIST), with the catchy title “NIST Special Publication 800-63.” The paper recommended that passwords be cryptic, contain special ch...</description>
			<category>Security</category>
			<pubDate>Fri, 18 Aug 2017 14:22:22 +0100</pubDate>
		</item>
		<item>
			<title>Kaspersky Withdraws Microsoft Antitrust Complaints</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3516:kaspersky-withdraws-microsoft-antitrust-complaints&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Kaspersky Labs and Microsoft reach an agreement on how Windows 10 deals with 3rd party antivirus software-- leading to Kaspersky dropping its European antitrust complaint against Microsoft.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Kaspersky-labs.jpg&quot; border=&quot;0&quot; alt=&quot;Kaspersky Labs&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The Russian security company filed an antitrust complaint with the European Commission last June, following a similar complaint with the Russian Federal Antimonopoly Service (FAS). It claimed Microsoft uses its dominant position to push Windows Defender, a security solution Kaspersky deems inferior, by switch...</description>
			<category>Security</category>
			<pubDate>Fri, 11 Aug 2017 13:44:02 +0100</pubDate>
		</item>
		<item>
			<title>Symantec Offloads Web-Certification Business</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3508:symantec-offloads-web-certification-business&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Symantec sells its website certifications and related PKI solutions business to fellow security vendor DigiCert in a deal worth $950 million in cash and stock.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/symantecheadquarters-580x358.jpg&quot; border=&quot;0&quot; alt=&quot;Symantec&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;&quot;Transitioning our website security and related PKI solutions to DigiCert allows us to sharpen our enterprise focus on delivering unparalleled protection for the cloud generation through Symantec's integrated cyberdefence platform,&quot; Symantec CEO Greg Clark says. &quot;As our recently announced deals with Fireglass and Skycure demonstrate, we a...</description>
			<category>Security</category>
			<pubDate>Fri, 04 Aug 2017 13:04:25 +0100</pubDate>
		</item>
		<item>
			<title>Cisco Buys Observable Networks</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3475:cisco-buys-observable-networks&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Cisco buys more security capabilities with Observable Networks, a startup offering network-security-as-a-service technology with a focus on cloud deployments.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/Cisco-Systems-Inc.-696x345.jpg&quot; border=&quot;0&quot; alt=&quot;Cisco&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Observable Networks technology is based on dynamic behavioural modeling of all devices on the network. It provides real-time situational awareness of all users, devices and traffic on the network, whether in the datacentre or the cloud, with cloud-native machine learning techniques promising faster and more accurate identification of insid...</description>
			<category>Security</category>
			<pubDate>Fri, 14 Jul 2017 09:53:38 +0100</pubDate>
		</item>
		<item>
			<title>Symantec Gets Browser Isolation With Fireglass</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3470:symantec-gets-browser-isolation-with-fireglass&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Symantec acquires Fireglass, Israeli vendor of browser isolation technology able to protect against ransomware, malware and phishing threats. Financial details of the deal are not available.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/symantechhq.jpg&quot; border=&quot;0&quot; alt=&quot;Symantec&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The core Fireglass offering is a browser isolation platform allowing users to browse the web in a highly secure way. Organisations can isolate uncategorised websites, unknown links and email attachments, reducing attack surface significantly. The solution is delivered either on-premises, as a cloud services ...</description>
			<category>Security</category>
			<pubDate>Fri, 07 Jul 2017 12:46:31 +0100</pubDate>
		</item>
		<item>
			<title>Petya Ransomware Spreads Across Europe</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3461:petya-ransomware-spreads-across-europe&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>A malware spectre is haunting Europe-- a strain of the malicious code dubbed Petya, first seen encrypting computers in Ukraine before spreading to Spain, Germany, the UK, the Netherlands, Israel and the US.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/1706-expetr-1petya.jpg&quot; border=&quot;0&quot; alt=&quot;Petya ransom&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Also known as NotPetya, Petwrap or ExPetr, the malware has affected governments and industries, including shipping firms, airports, banks, a petroleum giant and even the radiation monitoring system at the Chernobyl nuclear reactor. According to Kaspersky, 50% of the malware's targets are indu...</description>
			<category>Security</category>
			<pubDate>Fri, 30 Jun 2017 10:08:31 +0100</pubDate>
		</item>
		<item>
			<title>Dark Web Hosts New Mac Malware</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3447:dark-web-hosts-new-mac-malware&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Security news site Bleeping Computer discovers a pair of Mac malware strains on the Dark Web-- a piece of spyware dubbed MacSpy and MacRansom, an example of Mac ransomware.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/macspy-malware-800x448.jpg&quot; border=&quot;0&quot; alt=&quot;Mac malware&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The two pieces of malware are the work of the same developer (or cybercriminal group), and are found on almost identical Dark Web portals. Both websites run on a &quot;closed&quot; manner, meaning interested parties have to contact the malware creator for demo packages and the price negotiations.
Following the initial Bleeping Compute...</description>
			<category>Security</category>
			<pubDate>Fri, 23 Jun 2017 09:27:21 +0100</pubDate>
		</item>
		<item>
			<title>Armis Aims at IoT Security</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3430:armis-aims-at-iot-security&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>Startup Armis emerges from stealth mode with a product aimed at the Internet of Things (IoT)-- an agentless IoT security platform allowing enterprises to see and control all devices and networks accessing their systems.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/iot_security-100675572-large.jpg&quot; border=&quot;0&quot; alt=&quot;IoT Security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;Founded in 2015 by CEO Yevgeny Dibrov and CTO Nadir Izrael, Armis technology runs on-premises and the cloud as either a physical or virtual appliance. In turn, the appliance connects to the Armis cloud platform to analyse the traffic passing through the network. A layered approac...</description>
			<category>Security</category>
			<pubDate>Fri, 09 Jun 2017 13:38:18 +0100</pubDate>
		</item>
		<item>
			<title>Splunk: Security Teams &quot;Overwhelmed&quot; by Attacks</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3424:splunk-security-teams-qoverwhelmedq-by-attacks&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>An IDC survey sponsored by operational intelligence platform provider Splunk reveals organisations are &quot;constantly under attack,&quot; so much so they often fail to &quot;effectively protect themselves.&quot;
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/TECH1-secure-060816-AP.jpg&quot; border=&quot;0&quot; alt=&quot;Security&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The survey involves 600 senior security professionals across Germany, France, Sweden, the Netherlands, the UK and the US. It shows 47% of security teams gather enough information about incidents to enable appropriate or decisive action, but only 27% think they are coping comfortably with the workload, whi...</description>
			<category>Security</category>
			<pubDate>Fri, 02 Jun 2017 10:28:18 +0100</pubDate>
		</item>
		<item>
			<title>Cisco and IBM Join Security Forces</title>
			<link>http://www.it-sp.eu/index.php?option=com_content&amp;amp;view=article&amp;amp;id=3420:cisco-and-ibm-join-security-forces&amp;amp;catid=38:security&amp;amp;Itemid=74</link>
			<description>The &quot;growing threat of cybercrime&quot; leads to Cisco and IBM Security joining forces, with a collaboration across products, services and threat intelligence.
&lt;img src=&quot;http://www.ftp-sgpartners.net/tdceu/uploads/uploaded/IBM-Cisco-1088x725.jpg&quot; border=&quot;0&quot; alt=&quot;IBM Cisco&quot; width=&quot;250&quot; style=&quot;float: left; margin: 10px;&quot; /&gt;The team up has Cisco integrate IBM QRader in its securutiy solutions, protecting organisations across networks, endpoints and the cloud. Customers will also benefit from the scale of IBM Global Services support of Cisco products in their Managed Security Service Provider (MSSP) offerings.
Meanwhile the IBM X-Force and Cisco Talos security re...</description>
			<category>Security</category>
			<pubDate>Fri, 02 Jun 2017 10:21:09 +0100</pubDate>
		</item>
	</channel>
</rss>
