Cybersecurity News and Product Reviews | SC Media

Home

Event invitation phishing scheme usurps efficacy of Microsoft, Google and Wells Fargo

A phishing campaign in multiple enterprise email environments purportedly protected by Proofpoint and Microsoft entices users with false event invitations in the form of .ics calendar invite attachments, Cofense Phishing Defense Center (PDC) reported. The convoluted scheme dupes recipients into thinking their bank accounts have been compromised, even though the ruse’s initial focus is stuffing…

IoT adds value, risk but management within reach

Along with the tremendous opportunity brought to the enterprise by the gadgets that hang off of the Internet of Things (IoT) comes sizable risk that organizations must assess and manage. “Value should be considered while determining risk,” said Paul Rohmeyer, associate industry professors at the Stevens Institute of Technology, who led the “Managing Cybersecurity and…

Only a Public-Private Partnership Can Secure the Electric Grid

President Trump recently issued an Executive Order to bar the purchase of certain critical electrical grid components from foreign adversaries. This order—like a similar telecommunications order released last year—reflects an acknowledgment by the federal government of a longstanding cyber threat to the electric grid posed by compromised equipment.  As with other threats to our critical…

UCSF paid $1.4 million ransom in NetWalker attack

The University of California, San Francisco (UCSF) ponied up $1.4 million to hackers to retrieve data encrypted during a NetWalker ransomware attack disclosed in early June.  “The data that was encrypted is important to some of the academic work we pursue as a university serving the public good,” according to a  statement from UCSF, which said…

VMware Carbon Black Cloud

VMWare Carbon Black Cloud does the work of multiple endpoint security solutions, using only one agent and console for more efficient operation. This software applies analytics and machine learning to the endpoint and cloud to identify and reduce vulnerabilities and misconfigurations and make systems harder to compromise. The use of multiple security tools increases system…

Sophos Intercept X Advanced with EDR

Sophos Intercept X with EDR operates as comprehensive endpoint detection and response software that uses deep learning to prevent known and unknown malware attacks and keep pace with the ever-evolving threat landscape. This endpoint security software stops breaches before they occur. Its AI-driven threat detection, prioritization, and investigation add expertise, optimize resources and reduce noise…

SentinelOne EPP Jamaica#38 / Agent 4.0

SentinelOne EPP, a next-generation endpoint software, uses single agent technology and AI for autonomous detection and response without the need for human intervention. This platform offers the right technology at the right time before, during, and after execution, delivering actionable context that security teams and CISOs alike will understand. The policies are simple to configure,…

Microsoft Defender Advanced Threat Protection

Microsoft Defender Advanced Threat Protection (ATP) has a broad range of endpoint security capabilities to prevent, detect, investigate and respond to advanced threats targeting enterprise networks. These bad actors use increasingly creative and sophisticated attacks. The growing complexity of attacks and broadening digital estate render any attack surface nearly impossible to protect. The Microsoft Defender…

McAfee MVISION Protect Plus EDR 10.7, 3.0

McAfee MVISION Protect Plus EDR delivers endpoint detection and response capabilities by identifying and visualizing threat data in real time. The number of modern threats enterprises face daily are constantly on the rise and growing more difficult to detect. This open-architecture solution streamlines workflows with assembled alerts, highlights high risk threats that demand immediate attention…

F-Secure Protection Service for Business, Computer Protection Premium 20.1

F-Secure Protection Service for Business, Computer Protection Premium operates as a cloud-native solution that saves analysts time in deploying, managing and monitoring security because of its integrated patch management, layered protection and advanced behavior and heuristic analysis. It delivers effective and consistent protection for all endpoints. With its cloud-native platform and third-party system integrations, F-Secure…

Next hm-product-review in Reviews