Jul
31

Oracle Linux 6.7 Officially Released with Unbreakable Enterprise 3.18.13 Kernel

From: Softpedia News Release

The operating system is available for download for free

Oracle, through Michele Casey, had the great pleasure of announcing the immediate availability for download of the Oracle Linux 6.7 computer operating system based on the freely available sources of Red Hat Enterprise Linux 6.7.

According to the release announcement, the seventh maintenance release of Oracle Linux 6 is here to upgrade the kernel packages to Unbreakable Enterprise Kernel (UEK) Release 3 (kernel-uek-3.8.13-68.3.4.el6uek) for 64-bit platforms, and Unbreakable Enterprise Kernel (UEK) Release 2 (kernel-uek-2.6.39-400.250.7.el6uek) for 32-bit architectures.

***

Jul
27

Provision of a Security Information and Event Management (SIEM) Solution [Scotland]

From: Public Contracts Scotland

Notice Details

Title: Provision of a Security Information and Event Management (SIEM) Solution
Published by: University of Aberdeen
Publication Date: 24/07/2015
Application Deadline:
Deadline Date:
Deadline Time:
Notice Type: Contract Award Notice
Has Documents: No

Jul
23

Finding The ROI Of Threat Intelligence: 5 Steps

From: InformationWeek/DarkReading

Advice from a former SOC manager on how to leverage threat intel without increasing the bottom line.  

During my time managing a security operations center at one of the largest defense contractors, executives would constantly scrutinize security budgets, focusing on the areas of security architecture that could be streamlined. The process typically would lead to one burning question: how can security teams leverage threat intelligence to increase ROI without adding headcount or doubling the bottom line? My answer involved five key steps:

Jul
23

Microsoft launches Advanced Threat Analytics

From: The Register

Pitch: Bust up the 200 day-long hacker party.

Microsoft’s Advanced Threat Analytics is going general-availability next month, so – as Redmond says – enterprises can more quickly spot intruders in their networks.

Since the last preview version, ATA engineering head Idan Plotnik says the framework has 13 new features to make it more scalable, with improved threat detection.

Read Complete Article

Jul
21

Facebook Enhances Osquery Security Analysis Platform

From: eWeek

By Sean Michael Kerner 

Facebook is adding query packs to the open-source osquery security framework that group together common sets of use cases for data analysis.

Facebook is enhancing its open-source osquery security framework with new features that make it easier for users to organize and gain insight from operating system information.

***

The incident-response query pack can also potentially help organizations identify privilege-escalation attacks. Marcos noted that, in order to escalate privileges, one has to perform actions or commands.

Read Complete Article

Jul
20

To Prevent Insider Threats, DOD Must First Define ‘Normal’

From: Defense One

The Pentagon thinks it can build an automated system to predict and prevent future Fort Hood-style attacks. But it’s a problem as big as big data itself.

***

Key to DoD’s these efforts is what’s called continuous evaluation, a method to continuously monitor personnel with important clearances or access for changes that Department believes could make them insider threats, like credit problems, family issues, arrests, etc. But DoD would like to be able to subject all personnel to that sort of examination.

Jul
14

Cyber security in process plants: Recognizing risks, addressing current threats

From: Control Engineering

As attacks on industrial control systems (ICSs) become more frequent and increasingly sophisticated, defensive strategies must evolve to keep up. Fortunately, the tools are getting better. See related video.

Eric Knapp

***

Understanding risks

The plant floor and process units have become a growing area of concern for cyber security. In much of the industrial base, operations are digitally driven. The era of analog has given way to networks of computers, automated machinery, and ubiquitous sensors. Plants are driven by a digital thread of technical data—product and process information—that can be shared throughout the enterprise and must be protected.

Jul
13

What is Microsoft Advanced Threat Analytics?

From: WindowsITPro

Q. What is Microsoft Advanced Threat Analytics?

A. Microsoft Advanced Threat Analytics (ATA) is based on Microsoft’s Aorato acquisition and provides a solution to help protect your organization from advanced attacks. It uses a number of methods to identify and provide alerting to attacks in your environment before they actually cause any damage. The best analogy I have heard is for credit card companies that monitor your normal usage patterns and alert you for something out of the ordinary. This is what ATA does for your organization’s security. The key methods to detect attacks are:

Jul
10

GAO: Early look at fed’s “Einstein 3” security weapon finds challenges

Editor’s Note: GAO’s testimony, INFORMATION SECURITY: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies (GAO-15-758T) is available here.

From: Network World


GAO: Information security incidents reported by federal agencies have risen from 5,503 in fiscal year 2006 to 67,168 in 2014.

By

When it comes to the government protecting all manner of state and personal information, the feds can use all the help it can get.

Jul
08

GAO: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies

Editor’s Note: GAO’s complete testimony (GAO-15-758T) is available here. Below is an excerpt.

From: GAO

Currently, we are reviewing NCPS in response to provisions of the Senate and House reports accompanying the Consolidated Appropriations Act, 2014. The objectives of our review are to determine the extent to which (1) NCPS meets stated objectives, (2) DHS has designed requirements for future stages of the system, and (3) federal agencies have adopted the system.

Our final report is expected to be released later this year, and our preliminary observations include the following:

Older posts «