Tag Archive for: Extends

Qualys Extends the Power of VMDR to Android and iOS/iPadOS Mobile Devices


FOSTER CITY, Calif., Feb. 10, 2021 /PRNewswire/ — Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, today announced it is expanding Qualys VMDR (Vulnerability Management, Detection and Response) to mobile devices with support for Android and iOS/iPadOS delivering an end-to-end solution for mobile device security.

Qualys’ all-in-one VMDR provides in-depth mobile device visibility, data security insights, proactive posture monitoring, and automated response for all iOS and Android devices and installed apps – just like VMDR does for on premises, endpoints, clouds, containers, OT and IoT assets. 

“The use of mobile devices as threat vectors has increased exponentially, particularly during the pandemic due to the growth in the remote workforce. Thus, I am pleased to see Qualys bring its outstanding Cloud Agent support to Android and iOS devices. Now I can expand my vulnerability management program to mobile devices and get the visibility I need to end mobile threats before they start,” said Suhail Muhammad, SOC Manager, global humanitarian aid organization.

Qualys VMDR for Mobile Devices provides:

Comprehensive Mobile Device and App Inventory – Get a holistic view of all Android, iOS/iPadOS devices and installed apps across your enterprise. Enriched inventory provides in-depth details on hundreds of mobile data points such as device type, OS version, installed apps, EOL status, device location, CA certificates, and more.

Continuous Vulnerability Assessment – Qualys’ lightweight Cloud Agent provides real-time visibility and assessment of device, OS, app, and network vulnerabilities using the industry’s most comprehensive signature database. Qualys automatically correlates vulnerabilities with the appropriate app versions improving accuracy and eliminating the time required to manually research and map weaknesses. 

Real-Time Misconfiguration Monitoring – Expand your vulnerability management program by continuously monitoring critical mobile device configurations as…

Source…

IDIS Extends Their Services With The Acquisition Of KT Powertel | Security News


Unlocking human-like perception in sensor-based technology deployments

Like most industries, the fields of security, access, and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation.
In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have access to accurate data generated by best-of-class solutions irrespective of the sensor modality. And, they need to be able to easily deploy such solutions, at the lowest capex and opex, with the knowledge that they can be integrated with preferred VMSs and PSIMs, be highly reliable, have low install and maintenance overheads and be well supported.
With these needs in mind, camera and computer vision technology providers, solutions providers, and systems integrators are forging ahead and have created exemplary ecosystems with established partnerships helping to accelerate adoption. At the heart of this are AI and applications of Convolutional neural networks (CNN), an architecture often used in computer vision deep learning algorithms, which are accomplishing tasks that were extremely difficult with traditional software.
But what about 3D sensing technologies and perception?
The security, safety, and access market have an additional crucial need: they must mitigate risk and make investments that deliver for the long-term. This means that if a systems integrator invests in a 3D sensing data perception platform today, it will support their choice of sensors, perception strategies, applications, and use cases over time without having to constantly reinvest in alternative computer hardware and perception software each time they adopt new technology or systems.
This begs the question – if the security industry knows what it needs, why is it yet to fully embrace 3D sensing…

Source…

Suspected Russian Hack Extends Far Beyond SolarWinds Software, Investigators Say


News Highlights: Suspected Russian Hack Extends Far Beyond SolarWinds Software, Investigators Say.

Almost a third of the victims have it

SolarWinds Corp.

SWI 0.24%

software initially considered the main attack route for the hackers, according to investigators and the government agency who looked into the incident. The revelation sparks concerns that the episode exploited vulnerabilities in enterprise software used by millions every day.

SHARE YOUR THOUGHTS

What changes do you think the U.S. government and businesses may need to make to protect data? Join the conversation below.

Hackers linked to the attack have broken into these systems by exploiting known bugs in software products, guessing passwords online, and responding to a variety of issues in the way

Microsoft Corp.’s

MSFT -2.92%

According to the researchers, cloud-based software has been configured.

About 30% of both private and government victims linked to the campaign had no direct affiliation with SolarWinds, Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency, said in an interview.

The attackers “gained access to their targets in various ways. This adversary has been creative, ”said Mr. Wales, whose agency, part of the United States Department of Homeland Security, is coordinating the government’s response. “It is absolutely correct that this campaign should not be viewed as the SolarWinds campaign.”

Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency, at a Senate subcommittee hearing in December.

Photo:

Rod Lamkey – Cnp / Zuma Press

Company investigators come to the same conclusion. Last week, computer security company Malwarebytes Inc. that some of his Microsoft cloud email accounts were compromised by the same attackers which SolarWinds attacked, using what Malwarebytes called “another intrusion vector.” The hackers broke into a Malwarebytes Microsoft Office 365 account and took advantage of a loophole in the software’s configuration to access a greater number of email accounts, Malwarebytes said. The company said it does not use SolarWinds software.

The incident showed how advanced attackers could jump from one cloud…

Source…

China Extends Its Censorship To Australian Books, Written By Australian Authors For Australian Readers

News that China is extending its censorship to new domains barely provokes a yawn these days, since it’s such a common occurrence. But even for those jaded by constant reports of the Chinese authorities trying to control what people see and hear, news that it is now actively censoring books written by Australian authors for Australian readers is pretty breath-taking. The Chinese government has done this before for single books whose message it disliked, but now it seems to be part of a broader, general policy:

Publishing industry figures have confirmed that the censors from the State Administration of Press, Publication, Radio, Film and Television of the People’s Republic of China are vetting books sent by Australian publishers to Chinese printing presses, even though they are written by Australian authors and intended for Australian readers.

Any mention of a list of political dissidents, protests or political figures in China, including president Xi Jinping, is entirely prohibited, according to a list circulated to publishers and obtained by The Age and Sydney Morning Herald.

As the story in the Australian newspaper The Age explains, the reason why Chinese censors are able to impose their views on books designed for the Australian market is that it’s cheaper to have books printed in China than in Europe, say, especially it if involves color illustrations. As a result, publishers can be faced with the choice of accepting Chinese demands, or not publishing the book at all because the costs are too high.

The list of taboo topics is long, albeit pretty specific to China. It includes mention of major Chinese political figures, such as Mao Zedong and Xi Jinping, as well as a list of 118 dissidents whose names may not be mentioned. Political topics such as Tiananmen Square, pro-democracy protests in Hong Kong, Tibetan independence, Uyghurs and Falun Gong are all out. Pornography is completely forbidden, but even artistic nudity can be censored. The Chinese authorities are very sensitive to how maps are drawn, since they can involve disputed borders. More surprising is the ban on mentioning major religions.

The Age article notes that the rules had been in place for some time, but largely ignored. Now, however, the censors are checking every page of every book, and enforcing the rules strictly. It’s yet another sign of Xi Jinping’s obsessive desire to control every facet of life — even outside China, if he can.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Permalink | Comments | Email This Story

Techdirt.