Carbon Black buys Confer for next-gen anti-virus

Carbon Black has bought Confer to boost its protection for network endpoints using a behavioral form of antivirus combined with cloud analysis of threats rather than traditional signature-based software.Called Cb Defense, the renamed Confer product uses behavior-based techniques to prevent attacks from getting started and blends in attack-detection and response as a way to halt ongoing attacks.These are supported by analytics based in the cloud that help detect malwareless attacks that employ legitimate tools that are built into operating systems as a way to stay below the radar of defenses that use hashes and signatures to detect.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyber attacks are on the rise

It's one thing to have security vendors email me suggesting that cyber attacks are getting worse. It's another thing altogether when a vendor comes to me with hard metrics. Such is the case with Arbor Networks, the security division of NETSCOUT.Given Arbor is all about helping to protect enterprise and service provider networks from distributed denial-of-service (DDoS) attacks, it is fair to suggest that any mention of increasing attack numbers is a little self-serving. But ulterior motives notwithstanding, it's worth hearing what they found.+ Also on Network World: DDoS attacks are more than disruptions to service +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyber attacks are on the rise

It's one thing to have security vendors email me suggesting that cyber attacks are getting worse. It's another thing altogether when a vendor comes to me with hard metrics. Such is the case with Arbor Networks, the security division of NETSCOUT.Given Arbor is all about helping to protect enterprise and service provider networks from distributed denial-of-service (DDoS) attacks, it is fair to suggest that any mention of increasing attack numbers is a little self-serving. But ulterior motives notwithstanding, it's worth hearing what they found.+ Also on Network World: DDoS attacks are more than disruptions to service +To read this article in full or to leave a comment, please click here

DARPA tackling reusable, modular chipset technology

Is it possible to develop chip technology that combines the high-performance characteristics of ASICS with the speedy, low-cost features of printed circuit boards?Scientists at the Defense Advanced Research Projects Agency this week said they were looking for information on how to build interface standards that would enable modular design and practical circuit blocks that could be reused to greatly shorten electronics development time and cost.+More on Network World: ‎DARPA: Researchers develop chip part that could double wireless frequency capacity+To read this article in full or to leave a comment, please click here

DARPA tackling reusable, modular chipset technology

Is it possible to develop chip technology that combines the high-performance characteristics of ASICS with the speedy, low-cost features of printed circuit boards?Scientists at the Defense Advanced Research Projects Agency this week said they were looking for information on how to build interface standards that would enable modular design and practical circuit blocks that could be reused to greatly shorten electronics development time and cost.+More on Network World: ‎DARPA: Researchers develop chip part that could double wireless frequency capacity+To read this article in full or to leave a comment, please click here

DARPA tackling reusable, modular chipset technology

Is it possible to develop chip technology that combines the high-performance characteristics of ASICS with the speedy, low-cost features of printed circuit boards?Scientists at the Defense Advanced Research Projects Agency this week said they were looking for information on how to build interface standards that would enable modular design and practical circuit blocks that could be reused to greatly shorten electronics development time and cost.+More on Network World: ‎DARPA: Researchers develop chip part that could double wireless frequency capacity+To read this article in full or to leave a comment, please click here

Sponsored Post: Cassandra Summit, Scalyr, Gusto, LaunchDarkly, Awake Networks, Aerospike, VividCortex, MemSQL, AiScaler, InMemory.Net

Who's Hiring?

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

  • Awake Networks is an early stage network security and analytics startup that processes, analyzes, and stores billions of events at network speed. We help security teams respond to intrusions with super-human  efficiency and provide macroscopic and microscopic insight into the networks they defend. We're looking for folks that are excited about building systems that handle scale in a constrained environment. We have many open-ended problems to solve around stream-processing, distributed systems, machine learning, query processing, data modeling, and much more! Please check out our jobs page to learn more.

Fun and Informative Events

  • Join database experts from companies like Apple, ING, Instagram, Netflix, and many more to hear Continue reading

Crypto: Nominated to the Cybersecurity Canon

If you are a cybersecurity professional or interested in cybersecurity at all, you should be familiar with the Cybersecurity Canon. What is a canon? There are lots of definitions, but the one that applies here is “a sanctioned or accepted group or body of related works.” With this definition in mind, the stated goal of the Cybersecurity Canon is: “To identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.”To read this article in full or to leave a comment, please click here

Crypto: Nominated to the Cybersecurity Canon

If you are a cybersecurity professionals or interested in cybersecurity at all, you should be familiar with the Cybersecurity Canon.  Just what is a Canon?  There are lots of definitions but that one that applies here is, “a sanctioned or accepted group or body of related works.”  With this definition in mind, the stated goal of the Cybersecurity Canon is:“To identify a list of must-read books for all cybersecurity practitioners -- be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes and the API economy

A few weeks ago I found myself in a meeting with the technical team at a major investment company that uses mainframes to support the massive amounts of data they work with every day. I spend just about all of my time talking with mainframers, but this conversation took a bit of an odd twist: they wanted to talk about application programming interfaces (APIs).It wasn’t what I expected, but after thinking about it more, it makes perfect sense. After all, APIs are driving just about everything these days. It’s no wonder so many people are (unironically) talking about the “API economy.”+ Also on Network World: The cloud’s silver lining: the mainframe +To read this article in full or to leave a comment, please click here

Pickup truck plows over ‘Welcome to Fabulous Las Vegas’ sign

So I ask a colleague to name the most famous city “welcome” sign other than Hollywood and he answers without hesitation: “Las Vegas.”Not anymore.The Las Vegas Review-Journal reports that the crash occurred just before 7 a.m. on Sunday and that the driver of the pickup suffered no injuries.The “Welcome to Fabulous Las Vegas” sign did not fare as well, as you can see in this Facebook video: Naturally, the sign has its own Wikipedia page, which has already been updated with news of the accident (I love Wikipedia) and begins:To read this article in full or to leave a comment, please click here

Pickup truck plows over ‘Welcome to Fabulous Las Vegas’ sign

So I ask a colleague to name the most famous city “welcome” sign other than Hollywood and he answers without hesitation: “Las Vegas.”Not anymore.The Las Vegas Review-Journal reports that the crash occurred just before 7 a.m. on Sunday and that the driver of the pickup suffered no injuries.The “Welcome to Fabulous Las Vegas” sign did not fare as well, as you can see in this Facebook video: Naturally, the sign has its own Wikipedia page, which has already been updated with news of the accident (I love Wikipedia) and begins:To read this article in full or to leave a comment, please click here

Telcos should only retain metadata to fight serious crime, EU judge says

Governments may order telcos to retain customer data, but only to fight serious crime, a top European Union judge has advised.Lobby groups European Digital Rights (EDRi) and Privacy International welcomed the recommendation, saying it adds to a growing body of legal opinion opposing mass data retention. It could even, said Privacy International, derail the U.K.'s Investigatory Powers Bill, introduced in March by Theresa May, then home secretary and now prime minister.Advocate General Henrik Saugmandsgaard Øe advised that a general obligation to retain data may be compatible with EU law, but cautioned that laws imposing such obligations should respect personal privacy and impose strict controls on access to the retained data, its security, and the period it is kept. Furthermore, such obligations can only be justified when strictly necessary in the fight against serious crime.To read this article in full or to leave a comment, please click here

Telcos should only retain metadata to fight serious crime, EU judge says

Governments may order telcos to retain customer data, but only to fight serious crime, a top European Union judge has advised.Lobby groups European Digital Rights (EDRi) and Privacy International welcomed the recommendation, saying it adds to a growing body of legal opinion opposing mass data retention. It could even, said Privacy International, derail the U.K.'s Investigatory Powers Bill, introduced in March by Theresa May, then home secretary and now prime minister.Advocate General Henrik Saugmandsgaard Øe advised that a general obligation to retain data may be compatible with EU law, but cautioned that laws imposing such obligations should respect personal privacy and impose strict controls on access to the retained data, its security, and the period it is kept. Furthermore, such obligations can only be justified when strictly necessary in the fight against serious crime.To read this article in full or to leave a comment, please click here

Newest Guccifer 2.0 DNC dump included personal info about celebrities and CEOs

Democratic National Committee hacker Guccifer 2.0 gave The Hill another batch of pilfered DNC documents; these are different than those files which included information on 11,000 donors given to The Hill last week. At that time, Guccifer had claimed that the press had been forgetting about him, that WikiLeaks was “playing for time” and he still had documents to dump.To read this article in full or to leave a comment, please click here

Newest Guccifer 2.0 DNC dump included personal info about celebrities and CEOs

Democratic National Committee hacker Guccifer 2.0 gave The Hill another batch of pilfered DNC documents; these are different than those files which included information on 11,000 donors given to The Hill last week. At that time, Guccifer had claimed that the press had been forgetting about him, that WikiLeaks was “playing for time” and he still had documents to dump.To read this article in full or to leave a comment, please click here

Security software that uses ‘code hooking’ opens the door to hackers

Some of the intrusive techniques used by security, performance, virtualization and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit. Researchers from data exfiltration prevention company enSilo found six common security issues affecting over 15 products when they studied how software vendors use 'hooking' to inject code into a process in order to intercept, monitor or modify the potentially sensitive system API (application programming interface) calls made by that process. Most of the flaws enSilo found allow attackers to easily bypass the anti-exploit mitigations available in Windows or third-party applications, allowing attackers to exploit vulnerabilities that they couldn't otherwise or whose exploitation would have been difficult. Other flaws allow attackers to remain undetected on victims' computers or to inject malicious code into any process running on them, the enSilo researchers said in a report sent via email that's scheduled to be published Tuesday.To read this article in full or to leave a comment, please click here