Securing the Cloud: Ward Off Future Storms

 
A recent incident has left the voting records of 198 million Americans exposed. The data included the names, dates of birth, addresses, and phone numbers of voters from both parties. It also included voter’s positions on various political issues and their projected political preference. Although it is not unusual to collect this type of information, it should raise alarm bells that the platform hosting this data was not secured. This is the largest known data exposure in the United States, leaving the sensitive information of millions of Americans unprotected.   When it comes to protecting personal information and sensitive data, extensive measures should be taken to keep the ...

CrashOverride

 
On June 20th Check Point published an IPS signature providing virtual patching for the Siemens SIPROTEC DoS vulnerability. This IPS signature can help protect against a new malware, CrashOverride, also known as Industroyer-- that is a direct threat to Electric Grid Operators.   CrashOverride is the fourth piece of ICS-tailored malware used against these targets and the second ever to be designed and deployed for disrupting physical industrial processes. CrashOverride was employed in the December 17th, 2016 cyber-attack on the Kiev, Ukraine transmission substation resulting in electric grid operations impact.   This malware is an extensible platform that can be used to ...

Check Point R80.10 Maximizes Security and Minimizes Operational Overhead for CCI Nice Côte D’Azur, Creating a “WOW” Effect

 
Security threats and attackers continue to adapt their techniques, making it more difficult than ever for organizations to protect themselves. When the CCI Nice Côte D’Azur upgraded to Check Point’s R80.10 Security Management, it increased threat prevention performance, efficiency, and visibility while reducing operational overhead.   In a recent chat with Frédéric Achache, IT Projects Manager of CCI Nice Côte D’Azur, I gained some interesting behind-the-scenes perspectives on its security challenges. The CCI is a metropolitan and regional agency charged with promoting economic development across the Alpes-Maritimes Côte D’Azur region. In addition to headquarters, ...

Security Brief for Connected Automotives

 
Introduction       The question of which companies will dominate the automotive industry in coming years is being decided in the contest to produce Internet-connected cars. Intel predicts 120 million vehicles with varying degrees of automation will be on our roads by 2030. (Shot, 2016).The development and popular adoption of automotive data connectivity and autonomous navigation will have major consequences for IT professionals in many industries who will be expected to provide a variety of IT services to consumers and employees through cars that in themselves are mobile computing platforms. Automotive Security Issues Because connected cars intersect the categories of ...

The Devil’s Bargain: Security or Productivity?

 
With so much riding on cyber security, those of us charged with providing it must make a devil’s bargain between conflicting priorities: maintain productivity by letting users receive and transmit information quickly, or protect information at the cost of unacceptable latency. The dilemma arises from the nature of today’s threats. In the original threat-signature model, which is still valid, threat actors distribute malware, which honeypots and other sensors around the Internet pick up and pass to security analysts. The analysts quickly generate the threat signatures antivirus and intrusion-prevention systems use to block threats. Security vendors update malware signatures in their ...

GDPR – here’s what you need to do right now

 
By now you may have heard of GDPR, the new European General Data Protection Regulation.  It’s a complex, and evolving piece of legislation that comes into effect in May 2018.  It doesn’t matter whether your organization has any presence in the EU, or where your applications and data are processed and stored.  If your organization holds or controls any data about an EU citizen, then you need to start thinking about being compliant with GDPR … and the sooner, the better. Simply put, GDPR requires companies to implement entirely new processes and procedures around the collection and storage of personally identifiable information (PII).  It defines PII as any information that ...

Getting your emails blocked? Don’t forget the semicolon;

 
Due to their common use in websites, JavaScript files are not detected by traditional Anti-Virus software. Scanning JavaScript files while browsing is virtually impossible due to its performance impact and probable high false positive rate, due to most sites using obfuscated JavaScript as a benign method to protect their intellectual property. To detect such attacks, the contextual data is needed. If you let the Anti-Virus “know” that the source of the JavaScript is email based, it can  overcome the mentioned limitation and block the JavaScript. This was the case with Gmail, which recently (in February) changed the allowed sent or received attachment policy to block JavaScript ...

Securing the Connected Car Steps Up a Gear

 
“Here in my car, I feel safest of all …” That line from Gary Numan’s hit single, ‘Cars’ sums up the way many of us feel when we’re driving: safe and protected in the privacy of our vehicles. But cars are increasingly connected to the outside world. Features that were once only available on premium luxury brands are now available across manufacturers’ model ranges, in basic city cars. These features include Bluetooth connectivity for pairing mobile phones, GPS navigation, 4G wifi hotspots, collision avoidance systems, remote diagnostics and more. In fact, with these capabilities, cars are rapidly becoming data networks on wheels. The production of new cars equipped with ...

Banking trojans are on the rise: here’s how to avoid being robbed

 
Banking trojans are helping cybercriminals to commit the perfect crime:  stealing money from the accounts of unsuspecting victims, almost untraceably and at minimal risk.  As such it’s no surprise that from June to December 2016, banking trojans were only fractionally behind ransomware in being the most prevalent type of malware, and in Asia-Pacific countries they far outstripped ransomware in the number of attacks.  So how do banking trojans work, and how can users protect themselves against an online bank robbery? First, banking trojans are among the stealthiest of all malware types.  After a banking trojan infects a user’s PC or web browser, it will lie dormant and wait for ...

Check Point Infinity – The Security Architecture of the Future – Today

 
Infinity is boundless.  Unfortunately so are your IT demands and security expectations.  The explosion of new technologies promising simplification, untold efficiencies and cost savings are only creating uncertainty, complexity and risk. There needs to be a force to unify and harness the promise of these new technologies for the benefit of business operations and customers.  Welcome to the future of cyber security, Check Point Infinity.  Check Point Infinity is the first ever consolidated, security architecture across networks, cloud and mobile providing the highest level of threat prevention.  The days of ineffective, disparate, point product security constructs are ...