FireEye Demonstrates Superior Email Threat Detection with No-Cost Cloud Email Evaluations

Grazed from FireEye

FireEye, Inc., the intelligence-led security company, today announced the availability of a new capability that allows organizations to evaluate email threat detection efficacy with a no-charge evaluation service powered by FireEye Email Security.

"Email continues to be the most prevalent attack vector, and adversaries are taking advantage. In fact, our recent study found that less than a third of email traffic was considered ‘clean'," said Ken Bagnall, vice president of email security at FireEye. "With the introduction of FireProof Email Threat Analysis, we provide the ability for organizations to assess their cloud email security - at no charge. The evaluation analyzes an organization's delivered email to determine if advanced threats are getting past current defenses. And in the evaluations that we've run for organizations, we've found a significant amount of malware that had bypassed their existing security tools."

CloudJumper Ensures Malware-Free Data Recovery Volumes for Workspace as a Service Customers with Acronis Backup Cloud

Grazed from CloudJumper

CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, today completed a one-year study of its data protection infrastructure and initiatives to reveal superior data recovery performance. The organization's advanced backup and disaster recovery infrastructure is made possible in part through the integration of Acronis Backup Cloud with the nWorkSpace WaaS platform. Marking a one-year anniversary since implementing the data protection software in its high transaction nWorkSpace environment, CloudJumper is reporting exceptional data recovery results across a client base covering tens of thousands of customers.

Acronis Backup Cloud is currently deployed across the CloudJumper WaaS environment as part of the platform's service package. Based on unique hybrid cloud architecture, Acronis Backup Cloud provides easy protection for all data in all environments, leaving the user in full control of what to protect and where to keep the protected data. It supports more than 20 platforms and allows data migration from one environment to another.

Carbon Black's Breakthrough 'Streaming Prevention' Leapfrogs Cylance, McAfee and Symantec

Grazed from Carbon Black

Carbon Black, the leader in next-generation endpoint security, today unveiled "Streaming Prevention," a cybersecurity technology that redefines the Next-Generation Antivirus (NGAV) market by combining a breakthrough prevention model with market-leading detection and response to stop both malware and non-malware attacks.

"Streaming Prevention" is the core technology powering Cb Defense, Carbon Black's NGAV solution, which can prevent, detect and respond to the most advanced cyber attacks, including non-malware attacks.

Non-malware attacks gain control of computers without downloading malicious software. Instead, they use trusted, native operating system tools, such as PowerShell, and exploit running applications, such as browsers, to "live off the land." These attacks pose a bigger risk than malware attacks because they are harder to detect and cause more damage. Virtually every organization was targeted by such an attack in 2016, according to Carbon Black research.

In protecting against non-malware attacks, "Streaming Prevention" is a fundamentally different approach to endpoint prevention than taken by Cylance, McAfee, Symantec and other antivirus (AV) vendors.

CloudLock Expands Malware Detection Orchestration Capabilities With Leading Malware Threat Detection Solution Providers

Grazed from CloudLock

CloudLock, the leading Cloud Access Security Broker (CASB) and Cloud Cybersecurity Platform, today announced its expanded cybersecurity orchestration ecosystem, delivering advanced malware detection capabilities through integrations with OPSWAT and VMRay to complement the company's existing integration with the threat emulation capabilities of Check Point. The first-of-its-kind integration unifies protection against malware and the growing volume of ransomware across hybrid cloud environments.

"The threat landscape -- particularly for malware -- is evolving as more organizations shift workloads to the cloud and adopt online business productivity and operations applications," said John Amaral, Head of Product Delivery at CloudLock. "By extending the power of CloudLock's cloud-native, multi-mode CASB through integrations with leading providers, our mutual customers gain powerful insight and threat mitigation capabilities to secure environments from the growing barrage of malware."

Cloud Computing: Menlo Comes Out of Stealth with Plan To Fight Malware

Grazed from TopTechNews. Author: Jeff Cozza.

A new security company has just entered the market with a new plan to defeat malware attacks over the Web and e-mail. Menlo Security, which just closed on a $25 million Series B funding round, unveiled its Isolation Platform aimed at protecting end users by executing all Web content in the cloud rather than on users' devices.

Headquartered in Menlo Park, Calif., the company, which emerged from stealth on Monday, consists of several researchers from the University of California, Berkeley, along with experts in security, cloud, and virtualization technology. The new round of financing brings the total company funding to $35.5 million -- Menlo also announced $10.5 million in Series A funding in November...

Morgan Stanley: We deal with "rogue IT" by blocking Amazon, Dropbox and other cloud services

Grazed from Author: Editorial Staff.

Financial services giant Morgan Stanley has dealt with the problem of "rogue IT" - departments contracting their own IT services from cloud computing companies - by restricting access to Amazon Web Services, Microsoft Azure, Dropbox and other big-name providers at the network layer.

The security problem posed by cloud computing services being used or procured under the radar of IT has become endemic - and poses a particular problem to organisations, like banks, that need to operate to a high degree of security. But at a presentation at the World Cloud Forum this week in which Laszlo Kollar, executive director of global cloud at Morgan Stanley, revealed how the bank is - slowly - shifting some services towards an internal cloud, Kollar admitted that the bank simply blocks Amazon, Dropbox and other popular cloud service providers to prevent staff from using them...

Security vendor blames Amazon for customer malware

Grazed from CSOOnline. Author: Antone Gonsalves.

A security vendor claims Amazon Web Services provided a cloud-computing customer with an unpatched version of Windows that resulted in a malware infection. Bkav, a network security company based in Vietnam, started investigating the incident after the AWS customer complained that Bkav software had failed to catch the data-stealing malware.

Bkav claims that AWS, a division of e-retailer Amazon, initially handed the customer a version of Windows Server 2003 that had not been patched since October 2009. Over the last five years, 300 vulnerabilities have been reported in the operating system, according to CVE Details...

Cloud Computing: Amazon is a hornet's nest of malware

Grazed from The Washington Post. Author: Editorial Staff.

Amazon's cloud computing service plays host to some of the most prolific malware distributors on the Internet, security researchers have discovered. Of the 10 sites that pump out malware most frequently, four are hosted on Amazon Web Services (AWS) - including the number one site,, according to a threat report published Wednesday by the IT security firm Solutionary.

The report comes a week after we learned that hackers allegedly used Amazon's cloud hosting solution as a platform for a botnet that scraped personal information from potentially millions of LinkedIn subscribers. Cloud computing is becoming an attractive way for online criminals to launch attacks against businesses and consumers because of its low cost. It allows users to instantly set up an array of virtual servers that can be ordered to perform both legitimate and abusive functions...