Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


older | 1 | .... | 249 | 250 | (Page 251) | 252 | 253 | 254 | newer

    0 0

    EU の新しいデータ保護規則によって、世界中に大きい変化の波が押し寄せています。企業責任を考えるうえでこの変化は無視できません。

    続きを読む

    0 0

    悪質な PowerShell による攻撃は、2017 年の下半期から 2018 年の上半期までで 661% も増加しました。2018 年第 1 四半期から第 2 四半期にかけても、倍増しています。

    続きを読む

    0 0

    Emotet の背後に潜むサイバー犯罪グループ「Mealybug」が、オンラインバンキングを狙うトロイの木馬を独自に使うモデルから、他の犯罪グループにマルウェアを流通する業者へと転身していることが確認されました。

    続きを読む

    0 0

    活発な攻撃グループが、公開されているツールやリサーチ、他の犯罪グループの成果を積極的に利用しています。

    続きを読む

    0 0

    詐欺師が、コール最適化サービスを利用して詐欺ページに電話番号を動的に埋め込んでいます。

    続きを読む

    0 0

    データ保護の改善と透明性の強化が、全世界のトレンドになりつつあります。

    続きを読む

    0 0

    大規模なコインマイニング攻撃で感染したルーターを調べ、その過程を究明しました。

    続きを読む

    0 0

    今月は、60 個のパッチがリリースされており、そのうち 20 件が「緊急」レベルです。

    続きを読む

    0 0

    シマンテックは、解析と検出をすり抜ける新たな手法を使うバージョンの jRAT を確認しています。

    続きを読む

    0 0

    シマンテックは、5 つの開発元が関与する 68 個の詐欺アプリを確認しました。いずれも執拗に広告を表示します。

    続きを読む

    0 0

    ふだん使っているアプリケーションで、個人情報がどのくらい収集されているか把握していますか。そもそも、本当にその個人情報は必要なのでしょうか。

    続きを読む

    0 0

    Linux.Mirai の亜種が、ビルドシステムを磨いて進化を続け、クロスプラットフォームで感染を拡大しています。

    続きを読む

    0 0

    マルウェアの作成者が、WMIC など正規のツールを多数利用して、情報盗取型のマルウェアを拡散しています。これは、「現地調達型」の手口が依然として使われていることの裏付けです。

    続きを読む

    0 0
  • 09/09/18--07:32: Menaces mobiles
  • Cette année encore, le nombre de menaces mobiles, de vulnérabilités et d’appareils mobiles obsolètes a augmenté. Que faut-il en penser ? Brian Duckering
    続きを読む

    0 0

    Un altro anno, un altro incremento nel numero di minacce e vulnerabilità del settore mobile e di dispositivi mobili obsoleti. Che cosa sta succedendo? Di Brian Duckering
    続きを読む

    0 0
  • 09/09/18--08:44: Mobile Threats
  • 2017 verzeichneten wir abermals mehr Mobile Threats, mehr Schwachstellen und unzählige veraltete Mobilgeräte. Warum Sie das interessieren sollte? Von Brian Duckering
    続きを読む

    0 0
  • 09/09/18--08:55: Las amenazas móviles
  • Un año después, seguimos constatando un incremento del número de las amenazas móviles, vulnerabilidades y de dispositivos móviles desactualizados. ¿Qué hacemos ahora? Por Brian Duckering
    続きを読む

    0 0

    今月は、61 個のパッチがリリースされており、そのうち 17 件が「緊急」レベルです。

    続きを読む

    0 0

    APIs – The Best Thing Since Sliced Bread
    Publish to Facebook: 
    No

    Who hasn’t heard the phrase “the best thing since sliced bread”? For whatever reason, this phrase has become the universal benchmark for talking about the next best thing. Surprisingly, the phrase came about because the process of making, baking, and slicing bread used to be so manual that once these steps were automated, bread rapidly became a mass-market product for the American home.

    So how does sliced bread relate to APIs? Although APIs have been around since the 70s, it wasn’t up until cloud computing that we really saw APIs take off. The ability to programmatically call a service, spin up new resources, and respond automatically to changing demands are the foundation for using Infrastructure as Code (IaC). No longer do you have to manually log into a product, click on some buttons, download data and then upload that data to another product. Instead with APIs customers can automate those steps, program every-day tasks, and deploy services that grow with the application. This is one of the reasons why Forbes called 2017 the “Year of the API Economy.”

    However, there’s one big catch to this new world of APIs. Each service or product usually has their own schema for API calls and integrating disparate products can require A LOT of plumbing. Although Symantec strives to provide a full set of products for multiple security use cases, we recognize that many of our customers use homegrown solutions or products from different vendors alongside ours. We hear from a lot of customers just how hard they struggle to connect those products in a meaningful way. The result is often siloed security products that don’t enhance context or our customers’ security. That’s why when we heard about Microsoft’s Graph Security API, we saw a great opportunity to integrate and help our customers take full advantage of our APIs.

    Microsoft Graph Security API

    Microsoft Graph Security API (or Security API) is a new service that provides a unified rest API for integrating data and intelligence from Microsoft and other 3rd party products and services. Using the Security API, customers can connect multiple services or products and use unified API calls to access or act on security insights. Think of the new service as a federated API gateway where integrated products deliver security alerts that customers can use to automate responses across all products.

    We love two things about the Security API: (1) unified schema, and (2) data security. By using a unified schema, customers now don’t have to worry about translating security alerts from one product to another. As part of the integration, the Security API establishes a schema that each vendor and product must follow to deliver alerts.

    Requests for alerts are federated to each security product - no data is stored by the Security API. This, coupled with strict customer access controls, creates confidence that customers can benefit from greater integration across their security products while preserving customer privacy and data protection.

    Symantec Cloud Workload Protection

    For Microsoft Ignite 2018, we’ve developed a Proof of Concept (PoC) to show how we’re planning to integrate with the Security API. Using Symantec Cloud Workload Protection (CWP), customers get  continuous visibility of workloads deployed across Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) and automatically protect applications hosted in the public cloud. Our PoC shows how customers can programmatically request results of anti-malware scans, updates to security policies, failed login attempts, and changes to the public cloud infrastructure monitored by CWP. With this information, customers can request more context on their public cloud infrastructure when they see suspicious behavior from other services or products or can automatically orchestrate remediations using API calls to CWP.

    And these are just a couple of the ideas we’re evaluating as we look to bring more functionality for our customers. We will be demonstrating the PoC for these use cases and others at the Microsoft Ignite Conference. If you’re attending, come visit our booth (G1834 in the Expo Hall of the Orange County Convention Center) to see our demo and give us feedback on what else you’d like to see. Also keep watching our blogs to see when we’ll officially release CWP integration with the Security API. By leveraging CWP APIs and the Security API, you can easily automate your security response and create remediation playbooks that are the next best things since…well you know…sliced bread.


    0 0

    シマンテックは、8 月中旬以降、25 万件に迫るフォームジャッキング攻撃を遮断しています。

    続きを読む

older | 1 | .... | 249 | 250 | (Page 251) | 252 | 253 | 254 | newer