article thumbnail

Overview of @Triumfant by @SecureNinja @FedCyber 2013

CTOvision

By Bob Gourley SecureNinjaTV’s Alicia Webb continues our coverage of FEDcyber 2013 by speaking with Triumfant’s President & CEO John Prisco about malware detection and remediation. Cyber Security Advanced Persistent Threat Alicia Webb FEDcyber 2013 John Prisco JSON-RPC Triumfant YouTube Zero-day attack'

Malware 236
article thumbnail

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures

CTOvision

FAIRFAX, VA–(Marketwired – Dec 16, 2013) – Invincea, Inc., FAIRFAX, VA–(Marketwired – Dec 16, 2013) – Invincea, Inc., Additionally, the company announced it acquired Sandboxie in an earlier 2013 transaction.

Dell 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Enhancing Maritime Security: Lessons from the Key Bridge Incident

SecureWorld News

So, we are more and more dependent on the security and resilience of the systems running critical infrastructure—maritime in this case. A Sector Specific Agency (SSA) was identified for each critical sector, with the Department of Homeland Security (Transportation Security Administration and U.S.

article thumbnail

Security attacks and countermeasures

Cloud Musings

Johnson Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. by Sandra K. For example, recent breaches include 3.65

Security 159
article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection.

CTO Hire 255
article thumbnail

A series of patent lawsuits is challenging the history of malware detection

The Verge

Filed March 4th in the famously patentholder-friendly Western District of Texas court, the four lawsuits claim that techniques fundamental to modern malware detection are based on patented technology — and that the company’s competitors are infringing on intellectual property rights with their implementation of network security software.

Malware 60
article thumbnail

DOE’s secret weapon: Supercomputers, Developers Scramble to Build NSA-Proof Email and more

CTOvision

61% of IT pros don’t report security risks to executives – “A new Ponemon Institute study examined the disconnect between an organization’s commitments to risk-based security management and its ability to develop the collaboration, communication styles and culture necessary to security programs effective across the organization.”