Amazon Adds New Encryption, Security Features to S3

Amazon announced this week that it has added five new security and encryption features to its Simple Storage Service (S3), including one that alerts users of publicly accessible buckets. Improperly configured S3 buckets can expose an organization’s sensitive files, as demonstrated by several recent incidents involving companies such as Viacom, Verizon, Accenture, Booz Allen Hamilton,…

What’s Under Your Hood? Security & the Connected Car

Picture this: you’re driving your newly purchased, fully equipped, top-of-the-line automobile. You’ve just filled your tank, thanks to the crowd sourcing app GasBuddy, and you’re about to begin the commute to work. But first— coffee. Thanks to SYNC3, Ford’s latest infotainment system, you easily order by stating “Alexa, ask Starbucks to start my order.” Your…

The Myth of Security Enabling Your Business

Every year there are reports and surveys which make the case that security inhibits innovation, productivity and generally holds businesses back. I am not going to argue with that sentiment. Security requires that things are done in a certain manner, which can act as a constraint on wanting to do things a different way. What…

8 Older Companies Doing New Things in Security

The security space is growing with startups building game-changing technologies in identity management, training, privacy, and other niche areas to drive the future of security. This year is a big one for new companies trying to make a name for themselves in the industry. From a security investment standpoint, the first two quarters of 2017…

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducing the…

Analysis of 3,200 Phishing Kits Sheds Light on Attacker Tools and Techniques

Phishing kits are used extensively by cybercriminals to increase the efficiency of stealing user credentials. The basic kit comprises an accurate clone of the target medium’s login-in page (Gmail, Facebook, Office 365, targeted banks, etc), and a pre-written php script to steal the credentials — both bundled and distributed as a zip file. Successfully phished…