Ad Image

Endpoint Security and Network Monitoring News for the Week of February 2; Mimecast, U.S. Department of Justice, Backslash, and More

Endpoint Security and Network Monitoring News for the Week of February 2

Endpoint Security and Network Monitoring News for the Week of February 2

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of February 2. This curated list features endpoint security and network monitoring vendors such as Mimecast, U.S. Department of Justice, Backslash, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Endpoint Security and Network Monitoring News for the Week of February 2


Mimecast Announces Enhancements to QR Code Protections

Mimecast Limited (Mimecast), an email security solutions provider, this week announced that it has enhanced its Quick Response (QR) code protections to better serve current and future customers. Mimecast Email Security is now engineered to include deep scanning of URLs tied to QR codes, and upon inspection, malicious content will be blocked. “QR code attacks pose a serious and growing threat for organizations worldwide,” said Sean Brady, VP of Product Management. “At Mimecast, we will always innovate to meet our customers’ needs, and we are tackling this growing attack vector head-on to keep organizations secure.”

Read on for more.

Secureworks Launches Threat Score Capability

Secureworks, a global leader in cybersecurity, this week announced the launch of its AI-powered Threat Score to silence alert noise and reduce security analyst workload by potentially over 50 percent. “For AI to have meaningful value within cybersecurity it must positively impact workload, productivity and the outcomes security teams are delivering. Where AI adds true value is in leveraging large volumes of data and threat intelligence to dial down the noise, within the context of an organization’s operations, to provide accurate information about threat severity and likelihood. With dwell times falling, the response window is getting ever smaller. Threat Score gives confidence that analysts are applying resources where it is needed most to manage cyber risk for the business and its stakeholders. The art of the possible when your analysts’ workload is cut in half is truly significant,” said Kyle Falkenhagen, Chief Product Officer, Secureworks.

Read on for more.

U.S. Government Disrupts People’s Republic of China Hacking of Critical Infrastructure

A December 2023 court-authorized operation has disrupted a botnet of hundreds of U.S.-based small office/home office (SOHO) routers hijacked by People’s Republic of China (PRC) state-sponsored hackers. The hackers, known to the private sector as “Volt Typhoon,” used privately-owned SOHO routers infected with the “KV Botnet” malware to conceal the PRC origin of further hacking activities directed against U.S. and other foreign victims. These further hacking activities included a campaign targeting critical infrastructure organizations in the United States and elsewhere that was the subject of a May 2023 FBI, National Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), and foreign partner advisory. The same activity has been the subject of private sector partner advisories in May and December 2023, as well as an additional secure by design alert released this week by CISA.

Read on for more.

Backslash Weakness Database Unveiled

This week, Backslash announced the launch of the Weaknesses Database, an initiative designed to elevate awareness about the persisting relevance of vulnerabilities. This repository serves as a single pane of glass, providing a comprehensive view of all CWEs, with the goal “to help security professionals and development teams better understand and prepare for evolving threats.”

Read on for more.


Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

 

Solutions Review Launches The Thought Leader Project

The Thought Leader Project is a single initiative that brings the full power of Solutions Review’s authority, reach, and distribution to help technology vendors build brands, enhance their reputation, and ultimately, reach their target market.

Read on for more.

FBI Warning of China Raising US Hacking Efforts

“The warning from FBI Director Christopher Wray about Chinese hackers targeting US infrastructure emphasizes the sense of urgency needed to improve the security of core systems to critical infrastructure. It’s no longer safe to assume these core systems like Identity and Encryption are resilient; organizations need to manage the security posture of each of their critical systems. These measures are essential in ensuring vulnerabilities are identified and mitigated properly, reducing the risk of exploitation by malicious actors.”

-Mark B. Cooper, President & Founder of PKI Solutions

Share This

Related Posts