article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Malware Defenses. Secure Network Engineering.

Security 278
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

The acquisition and this new round of funding support Invincea’s rapid growth across the globe, expansion into the small business sector, and further solidifies its position as the market leader in this game changing cyber-security segment. FAIRFAX, VA–(Marketwired – Dec 16, 2013) – Invincea, Inc.,

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection.

CTO Hire 255
article thumbnail

DOE’s secret weapon: Supercomputers, Developers Scramble to Build NSA-Proof Email and more

CTOvision

61% of IT pros don’t report security risks to executives – “A new Ponemon Institute study examined the disconnect between an organization’s commitments to risk-based security management and its ability to develop the collaboration, communication styles and culture necessary to security programs effective across the organization.”

article thumbnail

Dept. of Justice credits Microsoft with identifying tech-support fraud scheme that targeted seniors

GeekWire

According to a DOJ news release, the complaint filed in October alleged that Cotter worked with co-conspirators in India from at least 2011 to 2020 to operate a technical-support fraud scheme. consumers were contacted via internet pop-up messages that falsely appeared to be security alerts from Microsoft or another well-known company.

Microsoft 128
article thumbnail

Update on Invincea: Another year of breakthrough growth

CTOvision

Users Secured Worldwide; Secured Core IP Through Patent Awards; Leadership in Advanced Threat Protection Endpoint Security Market. 8,935,773 for “Malware Detector.”. Hundreds of malware forensic analysts are now using Invincea Research Edition. From: [link]. Invincea Announces Breakthrough Growth in 2014.

Malware 150
article thumbnail

Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety

Network World

Cisco’s Talos security group this week warned that a variant of trojan monster Zeus has begun to garner a following in the cyber-underworld as a hard-to-detect attack mechanism. Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011.

Malware 60