Wednesday, July 3, 2019

Malwarebytes predicts AI-enabled malware to come

Security Digest
Information security news and advice from TechTarget's network | July 3, 2019
TechTarget
FEATURED STORY
Another Amazon S3 leak exposes Attunity data, credentials
by Michael Heller, Senior Reporter
UpGuard security researchers found publicly exposed Amazon S3 buckets from data management firm Attunity, which included company credentials and data from enterprise clients. (SearchCloudSecurity.com)
Advertisement
NEWS
 
AWS, customers tackle cloud misconfigurations and data exposures
AWS re:Inforce, the cloud provider's inaugural security conference, addressed the problems of misconfigurations and data exposures with new tools, like Control Tower. (SearchCloudSecurity.com)
 
Phishing-as-a-service threats abusing cloud services
According to new research, phishing kit providers are increasingly using popular cloud services to host their malicious links in an effort to conceal them from detection. (SearchSecurity.com)
 
AI-enabled malware is coming, Malwarebytes warns
AI-driven threats may not be here yet, but a new report from Malwarebytes predicts they will be here soon and could potentially change the cybersecurity game for good. (SearchSecurity.com)
 
Stellar Cyber launches Starlight 3.1 for AI threat detection
Stellar Cyber, a security analytics vendor, launched Starlight 3.1 as its first unified security analytics platform, using AI and machine learning to detect and thwart attacks. (SearchSecurity.com)
EXPERT ADVICE
 
What are the most important email security protocols?

Internet email was designed independent of security considerations, but these are the top email security protocols that add mechanisms to keep messaging safe from threats. (SearchSecurity.com)

 
What holistic network security tools offer an organization
Tools that provide a holistic approach to monitoring the IT infrastructure come in a variety of configurations and delivery models. Learn what's available. (SearchCompliance.com)
 
Comparing EDR tools: Cybereason vs. CrowdStrike vs. Carbon Black
Learn how tools from leading EDR vendors Cybereason, CrowdStrike and Carbon Black compare when it comes to helping security teams fight endpoint threats and respond to incidents. (SearchSecurity.com)
 
Why user identity management is a security essential
Who's on your network and accessing your data? IT security teams must be able to answer these questions. A strong identity management strategy will help. (SearchSecurity.com)
 
What's the best way to maintain top cybersecurity frameworks?
Keeping top cybersecurity frameworks up to date means understanding how a business evolves and changes. What steps should you take to maintain your security strategy? (SearchSecurity.com)
 
Everything you need to know about multi-cloud security
Make multi-cloud security a reality in your organization with these tips and strategies from industry experts as you implement more cloud platforms. (SearchCloudSecurity.com)
 
The CISO's guide to Kubernetes security and deployment
Container orchestration platform Kubernetes provides tools needed to deploy scalable applications with efficiency. Learn what steps CISOs must take to secure a Kubernetes environment. (SearchCloudSecurity.com)
 
IPsec vs. SSL VPN: Comparing speed, security risks and technology
IPsec VPNs and SSL VPNs both encrypt network data, but they do it differently. Learn about the differences and how to determine the right solution for your organization. (SearchSecurity.com)
 
Build a proactive cybersecurity approach that delivers
Whether it's zero-trust, adaptive security or just plain common sense, IT leaders must embrace an approach to IT security that's proactive, not reactive. (SearchSecurity.com)
 
Where does IMAP security fall short, and how can it be fixed?
Legacy email protocols like IMAP are prime targets for hackers. Fix IMAP security with better configuration, more encryption and multifactor authentication mandates. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2019 TechTarget. All rights reserved.
TechTarget

No comments: