The United States needs a Department of Cybersecurity

Ted Schlein Contributor Ted Schlein, a general partner at venture capital firm Kleiner Perkins Caufield & Byers, focuses on early-stage technology companies in the enterprise software and infrastructure markets, including ventures within the networking and consumer security arenas. More posts by this contributor What Silicon Valley can do about cyber threats The Entrepreneur’s Guide To […]

View More The United States needs a Department of Cybersecurity

Lessons from cybersecurity exits

Mahendra Ramsinghani Contributor Mahendra Ramsinghani is the founder of Secure Octane, a Silicon Valley-based cybersecurity seed fund. More posts by this contributor Is Symantec getting ready to buy Splunk? Can the security community grow up? To: ceo@cybersecuritystartup.com Subject: Lessons from cybersecurity exits Dear F0und3r: What a month this has been for cybersecurity! One unicorn IPO […]

View More Lessons from cybersecurity exits

Splunk’s data analytics gets a security boost with $350 million acquisition of Phantom Cyber

 The data analytics service provider Splunk is giving itself a security upgrade with the $350 million cash and stock acquisition of the security automation technology developer, Phantom Cyber.
One of the new darlings of the security industry, Phantom Cyber launched just four years ago to automate responses to digital threats.
Part of a new breed of tools that use network analysis and machine… Read More

View More Splunk’s data analytics gets a security boost with $350 million acquisition of Phantom Cyber

Splunk’s data analytics gets a security boost with $350 million acquisition of Phantom Cyber

 The data analytics service provider Splunk is giving itself a security upgrade with the $350 million cash and stock acquisition of the security automation technology developer, Phantom Cyber.
One of the new darlings of the security industry, Phantom Cyber launched just four years ago to automate responses to digital threats.
Part of a new breed of tools that use network analysis and machine… Read More

View More Splunk’s data analytics gets a security boost with $350 million acquisition of Phantom Cyber

The state of Israel’s cybersecurity market

 The Equifax breach, WannaCry, NotPetya, the NSA leak, and many more cyber incidents – 2017 was certainly a busy year for hackers, illustrating yet again just how vital innovative cybersecurity solutions are in the fight against cyber threats.
Second only to the U.S., in terms of cybersecurity investment 2017 was another excellent year for Israeli cybersecurity startups, with dozens of… Read More

View More The state of Israel’s cybersecurity market

Cybersecurity researchers breach Windows 10 facial recognition with a photo

TwitterFacebook

Researchers at the German IT Security company SySS GmbH successfully fooled the Windows 10 facial recognition system by using a printed photo of the user’s face.

Their spoofing efforts were published on the cybersecurity site Seclists on Dec. 18. The cybersecurity experts bypassed Windows Hello — which is Microsoft’s password-free security software — on both a Dell and Microsoft laptop running different versions of Windows 10, which is cause for concern for anyone using this feature to log into their account. 

Deceiving Windows 10 didn’t take too much effort. It just required “having access to a suitable photo of an authorized person” to “easily” bypass the system, wrote the experts. The photo required is the full image of someone’s face — so if someone really wants to attempt to deceive the facial recognition system, the barriers aren’t too great.  Read more…

More about Tech, Cybersecurity, Windows 10, Computer Security, and Windows Hello

View More Cybersecurity researchers breach Windows 10 facial recognition with a photo

Twitter adds support for app-based two-factor authentication

 Twitter is rolling out an update to its platform security that will allow users to employ third-part authentication apps to receive a two-factor login authentication for their Twitter account. Twitter has offered two-factor for a long while now, but it’s used the less secure SMS-based verification method excessively until now. The third-party app support means you can use tools like… Read More

View More Twitter adds support for app-based two-factor authentication

The White House wants to ban cell phones, citing security risk

 The Donald can’t seem to keep his hands off the phone while in the White House, but the same rules may not apply to his staff in the near future. The White House is mulling a personal cell phone ban for employees and possibly visitors, citing cybersecurity concerns. Read More

View More The White House wants to ban cell phones, citing security risk

Imgur says 1.7M emails and passwords were breached in 2014 hack

 Image-hosting site turned meme social network, Imgur, is the latest tech service to ‘fess up to a security breach. In a blog post Friday it revealed that hackers had compromised its systems in 2014, with ~1.7M emails and passwords affected.  Read More

View More Imgur says 1.7M emails and passwords were breached in 2014 hack

Uber data breach includes UK users — but it’s still not clear how many

 The UK’s digital minister has said the October 2016 data breach that Uber disclosed this week does affect UK users — though it’s still unclear how many are impacted at this stage. Read More

View More Uber data breach includes UK users — but it’s still not clear how many