Tag Archive for: takes

Startup Ionic Security takes the sweat out of securing documents

Well-funded startup Ionic Security has launched a data-protection service that guards encrypted documents no matter where they go until access is authorized by its policy engine based in the cloud, making it possible to protect data even if the files that contain it fall into the wrong hands.

Ionic controls access to the keys needed to unlock encrypted documents so only those who are meant to access the data have the ability to decrypt it. In addition, the service sets policies on what can be done with the data once it’s accessed.

Ionic Security CEO Steve Abbott

Ionic Security CEO Steve Abbott

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Sophos takes rare step of citing Microsoft flaw as a must-fix

Sophos generally steers clear of pointing to a single patch from Microsoft’s Patch Tuesday, but is breaking its own rule this month by highlighting one it says can prevent a world of hurt.

The patch – MS15-034 – addresses a bug that could allow remote-code execution on a victim machine, and that can be exploited via any application using Microsoft’s http stack, according to the Sophos Naked Security blog.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Cybersquad takes down Beebone botnet – ZDNet


ZDNet

Cybersquad takes down Beebone botnet
ZDNet
credkaspersky.png Kaspersky Labs. The Beebone botnet, used to deliver multiple malware payloads to compromised machines, has been shut down by US and European forces. On 8 April, Europol's European Cybercrime Centre (EC3) and the Joint …

and more »

flame malware – read more

Startup takes the effort out of endpoint detection and response

Startup Red Canary is offering an endpoint detection and response service based in the cloud that is backed up by a team of analysts who weed out false alarms.

The service, called Red Canary, takes data gathered from customer endpoints, analyzes it and delivers alerts to customers so they can take steps to block attacks.

While the service uses its own behavioral analysis, code analysis, and base-lining tools, it relies on Bit9+CarbonBlack for endpoint sensors. It gathers threat intelligence on its own and supplements it with the resources of Threat Recon, Farsight Security and Bit9+CarbonBlack’s Threat Intelligence Cloud.

To read this article in full or to leave a comment, please click here

Network World Tim Greene