Tag Archive for: Designed

SS8 makes enterprise version of traffic-analysis platform designed for intelligence agencies

SS8 built its network traffic-inspection and analysis platform as a tool for intelligence agencies to discover communications among criminals and terrorists but now has scaled it back for enterprises to stop data breaches.

Called BreachDetect, the business-sized software gathers highly detailed network traffic data that discovers application flows and the activity of individual machines and analyzes them to find anomalies that indicate foul play.

The platform also stores the information it collects so it can be analyzed over and over as new threat indicators are identified. That way corporate security pros can discover threats that may have been lurking undetected for months and figure out when and how they got there, SS8 says.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

New tool from Cloudmark is designed to defend against spear phishing  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  

The nature of how cyber attacks start is changing. Today’s malicious actors are not merely opportunistic, they know what information they want and who to target to get at it. For example, the 2014 breach at JP Morgan reportedly began when an IT employee opened a specially-crafted email and was tricked into providing credentials to a vulnerable internal machine. Attackers used the privileges of that person’s credentials to move around the network until they were able to find and exfiltrate 83 million records in one of the largest data breaches of the year.

To read this article in full or to leave a comment, please click here

Network World Security

Creepy T-shirts designed to baffle Facebook facial-recognition software

How do you fight facial recognition? You could always swap out your profile picture for that of your pet, or – this option just in – buy a T-shirt printed with creepily distorted faces of celebrity impersonators, designed to give Facebook’s facial recognition technology a migraine.
Naked Security – Sophos