This was bound to happen. We saw Zenprise get picked up by Citrix. Many of expected Mobile Iron, Airwatch or Good to be next. William Alden from Dealbook gives us the skinny on the VMware purchased of mobile device security company AirWatch. The original post can be found HERE.
Looking to shift its software offerings, VMware has struck a $1.54 billion deal to bolster its mobile technology.
VMware said on Wednesday that it had agreed to buy AirWatch, a start-up based in Atlanta that makes mobile management and security software for businesses. VMware is paying about $1.18 billion in cash and $365 million in installment payments and assumed unvested equity. Continue reading →
The researchers at Marble Security developed a interesting infographic covering the biggest security breaches of 2013. The original post can be found HERE.
In 2013, millions of accounts were compromised. Customers suffered and businesses lost millions of dollars due to the massive security breaches that took place. However, these security breaches are only expected to increase. Through 2016, the financial impact of cybercrime will grow 10% per year due to the continuing discovery of new vulnerabilities.
So what does that mean for businesses?
That the importance of protecting their assets, while investing in security should be a top priority. For example, the Adobe data breach of 2013 was the largest breach in security, where there were unconfirmed reports of hackers attaining 150 million accounts and exploiting customers’ data. The breach cost them millions of dollars and displays the importance of finding a solution that works. Continue reading →
Want to protect your privacy when using the Internet? Well unfortunately that is tough to do these days. Many agencies and governments are investing in network surveillance programs to monitor Internet traffic. Firewalls can offer application visibility packages capable of identifying device and browser type, where people are surfing the Internet and what applications are being accessed. Most websites include tracking cookies that gather data about users accessing their resources. Data obtained about you is used for various things you probably are not aware of and may not approve. This includes selling that data to large marking firms that eventually turns into SPAM and other unwanted contact. A more extreme example of unauthorized surveillance is covered by Jacob Appelbaum’s talk on the US governments Internet spy tools (found HERE). Its eye opening!
I have had many people ask about Intrusion Detection / Prevention (IPS / IDS) options you can add to the next generation Cisco Adaptive Security Appliance (ASA) also known as the ASA X Series. The confusion comes from the option to go with a dedicated IDS / IPS vs Application Visibility, Reputation Security and IPS all in the Next Generation Security package part of the ASA CX solution. Here is a overview of how both solutions work.
The core of both offerings is the 2nd generation ASA appliance or ASA X series (more info found HERE). The current latest ASA code release is 9.13. The ASA appliance can be configured using Command line, ASDM or Cisco Security Manager. The appliance should have a IP address so for example sake, lets say its 192.168.1.10. You can access that IP using a standard web browser and the ASA will prompt you for options to manage the ASA using ASDM. Continue reading →
New York Times writer NICOLE PERLROTH wrote a article about the recent announcement by Palo Alto acquiring Morta Security. The original post can be found HERE. It is interesting to see both Palo Alto and FireEye invest in security forensic technology. Here is Perlroth’s write up on the event.
Palo Alto Networks has acquired Morta Security, a two-year-old Silicon Valley security start-up run by former employees of the National Security Agency and the United States Air Force. Continue reading →
Tung Yin is a professor of law at Lewis & Clark Law School in Portland, Oregon. His main area of focus is national security law, criminal procedure, terrorism and law, and federal criminal law. He has conducted extensive research on domestic legal problems that were borne from counter-terrorism practices and policies in the aftermath of 9/11. Professor Yin has more than a decade of experience as a lawyer. A lot of his work is featured on leading newspaper sites such as Washington Post. The NSA has been one of the issues that professor Yin has addressed through his expertise. His opinion has been featured on several national television shows dissecting the NSA. In his interview, he highlights the dynamics of the NSA in our lives and helps us gain a better perspective of the dos and don’ts of dealing with the NSA. Continue reading →
Here is a really cool infographic developed by the director of researcher at Lancope. The original post can be found HERE.
In October, Tom Cross, Lancope’s Director of Research, presented a poster at Visualization for Cyber Security (VizSec) 2013 in Atlanta, GA . The poster included visualizations of the command-and-control channels of nearly two million botnet samples in an effort to help foster a better understanding of how botnets operate, and more effectively differentiate them from legitimate network traffic. The poster was created as a result of data analysis conducted by Lancope’s StealthWatch Labs research team. Continue reading →
Pickpocketing is an old yet popular crime. Reason for this is the return can be as high as a robbing a store without the risk of using weapons or be identified by victims. Pickpockets can operate as a team or individually and typically involve a form of deception to conceal the crime. Most victims won’t realize they have been robbed until the pickpocket is long gone and if caught, the criminals face minimal jail time since lethal threats are not involved. Here is a review of the most common tactics used by pickpockets and methods to avoid becoming a victim. Continue reading →