February 2019 | SC Media

Print Issue: February 2019

Bullish on cybercrime

As the U.S. economy takes investors on a wild ride, turning all the usual indicators topsy-turvy and sparking concern that the bear will usurp the bull, one market seems to be on a perpetual upswing — cybercrime. Threat intelligence researchers agree that adversaries are well connected in the sophisticated virtual labyrinths of the dark web,…

Wicked (dark web) wish list

The dark web can be a fairly lawless place, but even the most hidden corners of the darknet are not immune to the laws of supply and demand. Malware programs, cybercriminal services and stolen data can skyrocket in popularity on the underground market just as quickly as they can fall out of favor – same…

Hacking Back

Close your eyes for a moment and whisper the term “hack back.” Doesn’t it conjure up familiar rough-hewn heroes played by the likes of Charles Bronson and Kris Kristofferson who roamed the silver screen with some regularity in the 1970s, tracking down bad guys and meting out justice when authorities either could not or fell…

To catch a cyberthief

Any long-time fan of Law & Order is intimately knowledgeable with how the American legal system operates –  well at least on TV. Almost every episode starts out with some poor soul found dead, dying or badly beaten. Investigators show up, there is some witty banter about the victim, despite the still-warm body lying there…

IllenaArmstrong

Cybercrime pays…on both sides

Cybercrime, apparently, does pay. This is according to a few of the articles in this edition as well as many other news and feature reports we’ve done in the past based on any number of research papers that have sprung up over the last 12 to 18 months. Illena Armstrong, VP, editorial of SC Magazine.…

A steady stream of phishy emails

Phishing scams have the ability to swoop up valuable information with one deceptive email, so it makes sense they have been a popular methodology for cybercriminals for a while. And it’s likely to remain that way, at least for the time being. Scott Gerlach is chief information security officer at SendGrid. 2018 proved that phishing…

vArmour Application Controller

vArmour recognizes that a shift to hybrid cloud environments and micro-services has left enterprises blind to application flows. It has an increasing number of partnerships with third parties with agent or device level controls that can be used for per workload telemetry and per workload enforcement, building policies surrounding applications and enforcing them based on…

GuardiCore Centra Security Platform

GuardiCore’s Centra architecture is based on three tiers. Collectors are deployed at the infrastructure level while agents are deployed at the guest level. An optional aggregation tier is installed only when agents are deployed, and centralized management and deception is usually provided as SaaS but can also be deployed on-premises. Native enforcement has Layer 4…

CloudPassage Halo

CloudPassage provides users with cloud security posture management, vulnerability assessment, file integrity monitoring, configuration management, host log monitoring, host admin privilege management and application control. CloudPassage Halo can be applied to any workload form factor with any deployment model. The initial deployment can be completed in hours, with expansion in days. The auto-scaling grid keeps…

ShieldX Elastic Security Platform

ShieldX believes going beyond control is important for resiliency, and provides a dozen capabilities, including a firewall, IPSs, URL filtering and more. Customers can expect to be able to block new vectors of cloud-based attacks. ShieldX has the speed and scale to perform at the levels expected in the cloud. Full stack protection is offered…

Next hm-product-review in Security News