AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organisations, apparently from Chinese attackers.

 According to the Unified Security Information and Event Management (SIEM) solutions specialist, the attacks signal a serious escalation into cyberspace of the cold war that has existed between the two countries since the Chinese army marched into majority Tibetan territory back in 1950.

 Jaime Blasco, head of labs with AlienVault, said "Our research suggests that the attacks we have been tracking over the last few months are linked to the Kalachakra Initiation, a Tibetan religious festival that took place in early January," he said.

Read more: AlienVault research shows China escalating Tibetan cold war firmly into cyberspace

London, UK (15 March 2012)—Cyberrisk is a real threat to enterprises and requires diligent risk mitigation strategies. Global IT association ISACA will address at its free virtual conference how enterprises can recognize and prevent cyberattacks with sound security measures. Attendees will learn from industry specialists and network with peers from around the world, all without leaving their desks, at the event titled Enterprise Risk Management:  Provide Security from Cyberthreats, on Thursday, 22 March 2012, from 9:00 a.m.–4:00 p.m. CDT (UTC-5).

Read more: ISACA Virtual Conference Will Provide Tactics for Mitigating Cyberrisk

Ensuring that Cloud Services can be provided securely and reliably across wide area networks is a challenge that can be addressed with Synchronized Traffic Generation

ANDOVER, Massachusetts, February 23 – Napatech recently released advanced features for synchronized traffic generation that can be beneficial for testing and securing cloud services. Availability and security are prime concerns for cloud service users, but can be a challenge for cloud service providers to assure without the proper test infrastructure. Napatech Synchronized Traffic Generation helps address this challenge enabling cloud service providers to test and secure their cloud service on an end-to-end basis across wide area networks.

Read more: Napatech Synchronized Traffic Generation for Cloud Security

Manchester (UK) and Boston (USA), February 27 2012 – Avecto – a leader in Windows privilege management, today released further details of the integration of McAfee® ePolicy Orchestrator® (McAfee ePO™) software with Avecto Privilege Guard 3.0. The joint offering provides a complete privilege management solution for securing and protecting endpoints, from a single console, without having to compromise on end user productivity. Privilege Guard’s seamless integration with McAfee’s ePolicy Orchestrator management platform allows all joint customers to adopt least privilege – an essential part of a desktop security strategy.

Read more: Avecto Integration with McAfee ePolicy Orchestrator platform Consolidates Endpoint Security and...

 

Tufin Releases Its Security Suite R12-1 With Interactive Dashboard And Automated Change Provisioning

New Release Enables Security Teams to Automate Change Provisioning and Dramatically Streamline Operations

Ramat Gan, Israel, February 22, 2012 – Tufin Technologies, the market-leading provider of Security Policy Management solutions, today announced release R12-1 of its award-winning Tufin Security Suite (TSS). TSS R12-1 features innovations such as an Interactive Dashboard, Automated Change Provisioning, and a new Policy Analysis interface that further enhances Tufin’s unique capability to analyze both network layer and Next Generation Firewall policies. 

 

 

Read more: Tufin Releases Its Security Suite R12-1 With Interactive Dashboard And Automated Change Provisioning