February 2019 | SC Media

Print Issue: February 2019

Cisco Tetration

The key characteristics and intent of Cisco Tetration are workload protection and functionality. Hybrid cloud workload protection collects telemetry information about communication across infrastructures and baselines it to identify deviations. Cisco provides a dynamic mechanism that uses machine learning to generate and maintain policies allotted by the applications. Once policies are enforced, they will continuously…

True crime: SamSam ransomware I am

It was one for the books – a mysterious cyberattack laying waste to systems in the city of Atlanta before moving on to a wide swath of targets, including health care companies, the Port of San Diego, the Colorado Department of Transportation. March 22, 2018 – Workers arriving in various departments in the city of…

Cloud-based security management

Over the past few years there has been quite a bit of conjecture around the security market and how it will continue to evolve. Security professionals have started to find their own real success against hackers comes from using the same tools and techniques as hackers to turn the tides. Increasingly, security products are adding in…

Cloud-based security products – Group Test

This month we focused on five products in the cloud-based security space that solve a problem almost every organization faces – the ability to have a broad security solution that can span over a multifaceted infrastructure environment whether it’s sitting in AWS, Azure, Google Cloud Platform, virtual environments or bare-metal on-premises machines. Some cloud-based security…

First look: InfoGPS

Security professionals across all industries face a common challenge: they cannot protect data if they don’t know where it is kept. The simple reality is that risk stakeholders at most organizations do not know what data is on their network. In turn, this knowledge gap makes it difficult to prioritize often-limited information security resources. The…

Power plant Russia

Hackers pounce on honeypot gateway to a ‘power station’

While the cybercrime ecosystem usually conjures a 21st Century online bazaar for buying and selling credit card numbers, some hackers possess loftier goals. Attackers stepped into a honeypot environment that was set up by Cybereason to emulate a gateway to a power substation of a major electricity provider in the U.S. shortly after credential became…

Where do nation-states fit into the ecosystem?

While official governments generally are smart enough not to directly employ attackers to carry out their missives, none of the researchers discovered smoking guns linking criminal operations to official governments. Still, intermediaries typically contact “hackers for hire engaged with bodies potentially representing nation states,” McAfee’s Raj Samani says. It’s only “logical for any nation state…

Next post in Security News