News
What’s a CSR?
If you have ordered an SSL Certificate before, you were most likely asked to provide a CSR. The CSR is used to deliver the public key that your server will use to identify itself. Generating a CSR can be a hurdle for non-technical staff that aren’t always familiar with the command lines that need to be created and today still remains a time-consuming process even for more experienced users.
CSR Creation Made Easy
Our new CSR creation tool makes it easy to generate the CSR for your server by simply inputting your certificate information (e.g. domain name, organization details, etc.) in the fields provided. The tool will automatically generate the command lines required to create the CSR on your webserver, so you don’t need to write them yourself.
The CSR tool provides command lines for most popular webservers, including OpenSSL, Exchange 2007, IIS and F5 Big-IP.
Bonus Features: Advice on Best Practices
To ensure your SSL Certificates are compliant with the latest security best practices, the CSR tool automatically defaults to the most secure algorithm (RSA) and only offers key length options in line with the latest CA/B Forum guidelines (2048 bit minimum).
Use The Tool
The CSR tool is available in multiple languages at https://csrhelp.globalsign.com and includes support information and FAQs for additional help with the CSR generation process. Secure you website today with SSL the easy way.
You can read the original article here.
Jan
The new release also brings reliability improvements and support for Windows Server 2012 and Windows Server 2012 R2.
SAV for NetApp is also included in the following endpoint products and suites:
Endpoint Protection Advanced
Enduser Protection
Enduser Data Suite
Enduser Web Suite
Complete Security Suite
To learn more, visit the Sophos for Network Storage page or download the free trial.
If you have a current license for one of these products, you can download Sophos Antivirus for NetApp 3.0 on your MySophos download page.
You can read the original article here.
The email reads:
Hello,
A Secure Document was sent to you by your financial institute using Google Docs.
Follow the link below to visit Google Docs webpage to view your Document
Follow Here. The Document is said to be important.
Regards.
Happy Emailing,
The Gmail Team
Phishing emails aren’t exactly rare, but this one caught my eye. In addition to being a somewhat plausible lure, it is an equal opportunity exploit. If you click the link you are presented with a phishing page hosted in Thailand. The page not only asks for your Google credentials, it also suggests it will accept Yahoo!, Outlook.com, Hotmail, AOL, Comcast, Verizon, 163.com or any other email account.
Of course, filling out this form can only end in tears. Your details are sent off to the compromised servers for whatever purposes these thieves desire. You might think, “So what? My Gmail isn’t full of secrets that will destroy my nation/life/career.” You would likely be wrong, because your email is the key to unlocking much of your online identity. Forget your banking password? No worries, they will email you a password reset link. Does your company utilize cloud services? Your email account is likely key to accessing these systems. Phishing is an amazingly successful technique. Just ask the Syrian Electronic Army, who with little technical talent have been able to compromise some of the most powerful media organizations in the world. As an IT administrator, these are opportunities to educate your staff on the risks.
This might not be the most convincing of the phishes that are out there, but it is a useful tool to educate your staff. Many organizations are using Google and other cloud service providers to provide critical IT services. At first glance this could be very believable. What do I do to avoid being a victim? I create shortcuts in my browser for all sensitive services. If I need to access my email, bank or other online service, I don’t click the link; I click the favourite.
You can read the original article, here.
Imagine a system that can alert you when it starts to rain, not only warning to get out your umbrella, but also putting more trains on the Metro to cope with the extra passengers, monitoring the cafes to ensure there is sufficient coffee, or alerting when a vending machine needs restocking. A tool that gives you a sharp overview of vast and complex infrastructure, combined with the intelligence to review and comprehend what is happening – well, that’s not merely SIEM. That’s LogPoint.
SIEM – or Security Information and Event Management. Quite a mouthful. So what does it mean?
Metaphorically speaking, SIEM is the Information Technology version of Closed Circuit Television (CCTV). In short: a surveillance system of all data within an entire IT landscape in order to catch intrusions, provide insight into operations and report on functioning.
The First CCTV
Originally developed in the 1930’s to monitor rocket launches, CCTV began to be used to remotely monitor people and equipment in the 1970’s. A very basic instrument at the time, it could not record, replay, keep or store images.
Unless you were watching it live, the event would be missed.
Log Files
IT Systems create log files for every activity, be it purely informational, or failures, or even successes. Log Files can also trace who performed the activity, when was it done, etc. However, log files are stored locally on each system, and unless someone can review each and every system, it is almost impossible to find everything. Just like the first CCTV, unless you are watching these logs in real time, the event will be missed.
CCTV Evolves
CCTV evolved throughout the 80’s and 90’s, gaining the ability to record and replay videos of people and activity – and this could then be used for investigation and criminal prosecution within the courts. Slowly, CCTV cameras began to appear everywhere. Today, there are 207,431 CCTV cameras covering a large percentage of the city of London – a similar story for most European cities.
Log Management
This is the basis for the Log Management software from which SIEM has evolved – software that enables log collection from an entire infrastructure, storing them centrally, and time-stamping them for analysis. This offers better insight into how “the crime” happened and took place, who was involved, and how can it be prevented in the future. But this still isn’t SIEM as we know it today.
Modern CCTV
CCTV has developed at an amazing speed since the turn of the century. Not only can it now record and store data from hundreds of thousands of cameras, it can also recognize auto registrations and even faces – enabling real-time alerts that can:
• Be sent to emergency operators.
• Dispatch police – e.g., when specific people enters a city or area where they have been banned.
• Track and alert suspicious behavior and movements, such as with crowd control, loitering in street theft hot spots, or troublemakers entering a bar.
SIEM
Like the modern CCTV, LogPoint is the most advanced form of SIEM – capable of monitoring millions of log files every second, from every device in an infrastructure, detecting log patterns as they evolve.
LogPoint can:
• Regularly report on general activities.
• Identify bottlenecks and monitor the health of your IT infrastructure.
• Replay events to identify when, what and who was involved – providing evidence in criminal prosecution.
• Reveal how to prevent incidents from happening again.
• Alert administrators to security threats and system failures – before they even happen.
LogPoint, is the best SIEM, ever.
Jan
“Sophos and Cyberoam create a winning combination at the right time, in the right product markets and in all the right geographies,” said Kris Hagerman, Chief Executive Officer for Sophos. “Cyberoam has built a strong reputation as an aggressive and nimble innovator in the network security market, and like Sophos, has a ‘channel-first’ approach and reputation for delivering top-notch service and support. The acquisition expands and accelerates our network security roadmap to grow our presence in UTM, advanced threat protection, wireless and next generation firewall – some of the fastest growing markets in all of IT. This also continues our focus of providing exciting opportunities to grow our channel partners and customers.”
For more information, visit the Sophos corporate blog.
Founded in 1999 and headquartered in Ahmedabad, India, Cyberoam is highly regarded for its product innovation, quality, and world-class customer support. The company has more than 65,000 customers, more than 550 employees, and a strong channel focus with a network of 5,500 partners, with particular strength in India, the Middle East, and Africa. Cyberoam’s high performance UTM and Next Generation Firewall appliances, built on a similar Intel-based architecture as Sophos’ UTM solutions, deliver advanced technologies that will complement and expand the entire Sophos network security portfolio. Some of these technologies include the iView reporting engine, application control, user-based network policies, sophisticated next-generation firewall capabilities and advanced threat protection.
Hemal Patel, CEO of Cyberoam said, “Together Sophos and Cyberoam form a powerhouse in network security. We are growing our network security businesses substantially faster than the market, and joining forces allows us to drive even greater innovation and value. Our global footprint, commitment to the channel and complete security portfolio are clear competitive differentiators. We’re pleased to join the Sophos team.”
The acquisition advances Sophos’ position in network security, a strategic growth area for the company and a pivotal element of the company’s complete security strategy. Sophos combines leading security technologies in endpoint, mobile, encryption and data protection, e-mail, web, server, and network – all focused on small and midmarket enterprises and pragmatic enterprises of any size – and delivered entirely through the channel. Combined, Sophos and Cyberoam will have more than 2,200 employees, with more than 600 focused on network security, including more than 350 in R&D.
According to IDC Research, the network security market reached $7.9 billion in 2012; UTM comprised $2.7 billion of the market and was cited as the fastest growing segment at 21% growth. In the recent Gartner Magic Quadrant for Unified Threat Management, Sophos was again named a “Leader” and Cyberoam a “Visionary.”
You can read the original article here.
Jan
There are many reasons why you should consider Sophos for your next firewall — here are five of them.
1. We keep it simple. It’s super easy to deploy, manage, and use – you’ll never need to configure with the command-line again.
2. You get lightning speed. Our SG Series appliances blow the competition away in independent tests. And if you prefer you can go software, virtual or cloud-based instead.
3. Everything’s on one box. It gives you the latest next-gen firewall features. Plus email, endpoint, and mobile features you can’t get anywhere else.
4. Reporting’s built in. Detailed reports come as standard, stored locally on a built-in hard drive. No separate appliances or tools required.
5. And we’re a three-time Gartner Magic Quadrant Leader. No other firewall vendor can say that. So you can rest assured you get proven protection you can trust from a Leader in UTM, Endpoint and Mobile Data Protection.
All of this good stuff, packaged in one super-fast, easy-to-use solution. To learn more, and see how we stack up against the competition, visit sophos.com/firewall.
You can read the original article, here.
One of Negobot’s creators, Dr. Carlos Laorden, told the BBC that past chat bots have tended to be too predictable: “Their behaviour and interest in a conversation are flat, which is a problem when attempting to detect untrustworthy targets like paedophiles.” The most innovative aspect of Negobot may be a key differentiator that makes it appear more lifelike: namely, the incorporation of the advanced decision-making strategies used in game theory. In a paper about their creation, the researchers describe how they’ve taught the robot to consider a conversation itself as a game.
For example, the bot identifies the best strategies to achieve its goal in what its programmers have taught it to understand as a competitive game. Negobot’s goal is to collect the information that can help to determine if a subject involved in a conversation has paedophile tendencies, all the while maintaining a convincing, kid-like prattle, sprinkled with slang and misspellings, so the subject doesn’t get suspicious. Negobot keeps track of its conversations with all users, both for future references and to keep a record that could be sent to the authorities if, in fact, the subject is determined to be a paedophile.
The conversation starts out neutral. The bot gives off only brief, trivial information, including name, age, gender and hometown. If the subject wants to keep talking, the bot may talk about favorite films, music, drugs, or family issues, but it doesn’t get explicit until sex comes into the conversation. The bot provides more personal information at higher levels, and it doesn’t shy away from sexual content. The Negobot will try to string along conversationalists who want to leave, with tactics such as asking for help with family, bullying or other typical adolescent problems. If the subject is sick of the conversation and uses less polite language to try to leave, the bot acts like a victim – a youngster nobody pays attention to and who just wants affection from somebody. Robot. Image courtesy of Shutterstock.From there, if the subject has stopped talking to the bot, the bot tries to exchange sex for affection. Is this starting to sound uncomfortably like entrapment?
That’s exactly what gets some experts worried. John Carr, a UK government adviser on child protection, told the BBC that overburdened police could be aided by the technology, but the software could well cross the line and entice people to do things they otherwise might not: “Undercover operations are extremely resource-intensive and delicate things to do. It’s absolutely vital that you don’t cross a line into entrapment which will foil any potential prosecution.” The BBC reports that Negobot has been field-tested on Google chat and could be translated into other languages. Its researchers admit that Negobot has limitations – it doesn’t, for example, understand irony.
Still, it sounds like a promising start to address the alarming rate of child sexual abuse on the internet. Hopefully, the researchers will keep it reined in so as to avoid entrapment – a morally questionable road that could, as Carr pointed out, ruin the chances for prosecutorial success. What do you think? Are you comfortable with the premise, or does the chances of entrapment sour the concept for you?
You can read the original article, here.
Jan
In comments that support Array’s ranking in the new report, IDC analysts note that the company’s WAN optimization solution has “increased its chances of cracking bigger deals and positioning themselves as an end-to-end solution provider in the ADC space.”
According to IDC, drivers of Array’s leading position in the India market include the ability to close deals in the lucrative government and banking and financial services industry (BFSI) markets, as well as the ability to offer holistic ADC and WAN solutions with custom costing to potential customers. Although Cisco still leads – due to volume WAN optimization sales – Array is mounting a challenge by way of continued growth in the WAN optimization space.
Mr. Shibu Paul, Country Manager at Array Networks said, “IDC is a respected authority tracking the markets Array serves, and the local IDC team in India has a superior understanding of vendors, partners and customers in the application delivery networking space. The Array team has been working tirelessly to serve our customers, assist our partners and enhance our offerings, and I am extremely pleased to see our efforts paying off as reflected in the new IDC market report.”
“In addition to growing traction in the enterprise based on its suite of application delivery networking solutions, Array is also opening up new opportunities with its line of software appliances which can be hosted on any virtualized server to break price barriers and make solutions more affordable to SMBs,” said Manoj Iyer, IDC’s market analyst for enterprise networking in India. “With the ability to support a broad range of customers and a go-to-market strategy focused on educating partners its load balancing, WAN optimization, enterprise mobility, high availability, BYOD and application acceleration solutions, Array is well positioned to further increase their market share in the application delivery networking market.”
You can read the original article here.
Jan
In particular, the overhead of running multiple concurrent antivirus scanners on a single host can affect performance and scalability. Meanwhile, the constant starting, stopping, and cloning of virtual machines can leave systems unprotected.
A new Sophos whitepaper explores these challenges and presents two effective approaches to securing your virtual machines without sacrificing performance: agentless antivirus and virtualization-optimized endpoint security. Simultaneous scheduled or on-demand scans can lead to a “scan storm,” increasing resource use and decreasing system performance.
“Scan storms occur when a host’s resources are overwhelmed by many virtual machines (VM) running antivirus scans at the same time. Because each VM is engaged in nearly identical behavior requiring multiple input/output (I/O) operations and substantial CPU processing, data throughput and system response time can slow noticeably. Even an otherwise speedy SAN or local storage array can be affected by the sheer volume of simultaneous read requests.”
The paper also covers how to choose the best approach and the right Sophos product (Sophos Antivirus for vShield, Sophos Server Protection, or Sophos Endpoint Antivirus) for your needs.
Download “Two Great Ways to Protect Your Virtual Machines From Malware” to learn more about how to deliver performance and security in your virtual data center (registration required).
You can read the original article here.
Jan
And we’ve been named a Visionary in the Gartner Magic Quadrant for Enterprise Mobility Management. Please contact technical support if you need more information or guidance.
What’s available in Sophos Mobile Control 4.0
SMC offers a full range of enterprise mobility management features, including:
- Central management of your mobile devices, content and applications with a user-centric approach
- Robust security protection with built-in anti-malware and web filtering
- Mobile content management with individual file encryption, ensuring encryption without compromise on your devices
- Reduced risk of data breaches with integrated Network Access Control
- Easy deployment and management with user based pricing, simplifying your budget
Highlights
- Use a simple role-based web console
- Push out policies and apps over the air
- Assign policies based on users’ Active Directory groups
- Regularly check for device compliance
- Remotely locate, lock and wipe devices
- Secure mobile content on iOS devices
- Filter web pages by category on Android devices
- You can choose either on-premise or SaaS deployment, or as a subscription option with Sophos Cloud.
Learn more about the great features in Sophos Mobile Control, or sign up for a free trial.
And find out how Sophos gives our customers security that’s simply better.
You can read the original article, here.
Sophos received top marks in the latest report from AV-Comparatives, a leading international testing lab. The report, titled “Impact of Anti-Virus Software on System Performance,” evaluated twenty one of the world’s leading security products on a PC running under Windows 7.
The testing lab prepared a total of 545 infection scenarios, and Sophos’ antivirus offering tied for the highest score among the products reviewed. It also received an “Advanced +” award, based on the lab’s assessment of the overall results.
“We value the work of independent testing labs like AV-Comparatives, as they help vendors like Sophos to strengthen our offerings, while providing consumers and businesses great insight so that they can make better informed decisions,” said Mark Harris, vice president, engineering, Sophos. “This latest recognition validates the great work of our team, which is committed to developing complete security solutions to combat advanced threats.”
In related testing news, Virus Bulletin, another leading independent lab awarded Sophos with a VBSpam award for its comparative anti-spam testing. This marks the 20th time that Sophos has received this honor for its Sophos Email Appliance. Additionally, Sophos recently received a VB100 award for Sophos Endpoint Security and Control as part of Virus Bulletin’s comparative review on Windows XP Professional SP3.
Click here to see the original article.
Jan
In addition to delivering iOS 7 support, Sophos announced an update for customers to manage the new business-focused features of Apple’s latest version from the easy-to-use Sophos web-based console, deployed either on-premise or as Software as a Service (SaaS).
According to Gartner, Apple iOS 7 includes more enterprise enhancements than any release since iOS 4.0 introduced mobile device management APIs. Version 3.6 of Sophos Mobile Control enables enterprises of all sizes to protect corporate data, with many new enhancements, including:
- Separation of company and personal data
- Per app VPN
- A new volume purchasing program (VPP)
- Remote configuration of apps
“Sophos Mobile Control allows us to easily manage our existing devices while simultaneously adding new devices safely into our organization,” said Jeri Sample, IT Manager, Meadville Medical Center, an outstanding community medical center in Meadville, Pennsylvania. “It is important for us to keep patient data secure. With accelerated deployment, ease of management, and complete visibility, SMC makes Sophos the right choice on behalf of our staff and our patients.”
“Mobile devices in the workplace are the rule, not the exception,” said John Shaw, Vice President for end user security products at Sophos. “Sophos Mobile Control provides simple to deploy mobile device management and security that will keep employees happy and productive, minimize the workload for IT, and give managers confidence that the company’s data is protected. We think iOS 7 is a huge step forward in enabling personal devices to be used securely at work, and are delighted to be extending the benefits to our partners and customers.”
To learn more about Sophos Mobile Control, please visit http://www.sophos.com/mobile.
The infected ads were served to visitors of the Yahoo homepage over a four-day period last week. Some of the malware that was served up could turn the infected computers into Bitcoin miners. The malware that Yahoo unknowingly served up attacked flaws in Java on the victim machines. Yahoo says that the malware was served up from December 31 to January 3 on its European sites.
Yahoo is being criticized for not doing anything to help the owners of computers infected with malware served from its site.
The web company has promised to monitor and block any ads being used for serving malware. Estimates are that around 27000 infections resulted every hour the ads containing the malware were served. Some malware installed by the rogue ads also installed ZeuS, which tries to steal banking information.
You can read the original article at SlashGear.
The new Sophos solution helps IT professionals confidently implement BYOD policies and provides users the flexibility they demand to stay productive and safe. It supports iOS, Android and Windows Phone 8 devices.
To learn more about SMC 4.0, check out this video.
SMC 4.0: Mobile Encryption, Integrated Security and User-Centricity
SMC 4.0 provides a simple, hassle-free and comprehensive approach to protecting mobile devices. With Mobile Content Management for iOS devices, SMC is the only EMM solution to offer file-level encryption, which gates access to each file, to protect the data in the office and on the go. SMC also delivers integrated security against malware and malicious web sites for Android devices, which account for 80 percent of smartphone operating systems* worldwide as well as the majority of mobile malware threats. The number of unique pieces of mobile malware seen by SophosLabs has now reached almost 900,000 and is growing rapidly.
With web protection for Android, IT administrators can select web site categories to control access and block data-stealing or inappropriate web pages. SMC 4.0 also provides unique integration with Sophos UTM, Checkpoint and Cisco to provide network access control. Compromised devices are isolated from the network, protecting the organization’s assets from malware on mobile devices. SMC’s user-centric deployment, management and pricing greatly simplifies administration. With an intuitive web-based management console, IT administrators can provide their users with a self-service portal to change passwords, register devices and report lost or stolen devices.
You can read the original article here.
Jan
Keenan brings more than 20 years of sales and sales management experience to Sophos, including 13 years with SonicWALL, where he most recently built a new sales organization for mid-market accounts and developed the division’s channel strategy. As vice president of North America Sales, Keenan grew the business by fostering key relationships with the company’s channel partners.
“John Keenan is widely respected by the security channel, and I am thrilled to welcome him to Sophos. He brings a proven track record of success in the security space and has winning experience in leading channel and sales teams,” said Michael Valentine, senior vice president of sales for Sophos. “Every day, the Sophos team is working hard to be the preferred vendor in security for the channel and customers. Our products, our people and our partner programs continue to gain industry accolades. In bringing John aboard, we have an ideal leader for continued growth in our North American business.”
“I am excited to join Sophos; the company’s value proposition of ‘security made simple’ clearly resonates with customers and the channel,” said Keenan. “The company’s relentless focus on empowering the channel, a best-in-class portfolio of endpoint, mobile, server and network solutions, and the opportunity to contribute to Mike Valentine’s winning team made my decision to join Sophos an easy one.”
Jan
Easy to deploy and simple to manage, Sophos Cloud gives Sophos partners and IT managers at enterprises of all sizes the ability to manage and maintain endpoint security to protect all users, regardless of physical location, via the cloud-based service. The launch of Sophos Cloud is the first step in the company’s aggressive strategy of cloud-enabling its entire portfolio. In addition, Sophos will continue to innovate and extend its ‘on-prem’ security software, providing IT professionals choice in how to best manage IT security in their environment.
Kris Hagerman, chief executive officer for Sophos, said, “Sophos Cloud is the answer to the constant struggle IT teams face in protecting and securing their enterprises. These IT teams may be as small as a single person, but the constant threats and challenges they face could overwhelm an army. To come to their rescue, we’re thrilled to deliver Sophos Cloud – it will be one of our key strategic priorities as we execute on our vision of being the best in the world at delivering complete and powerful IT security to small and mid-market enterprises and organizations of any size looking to simplify their IT security operations“.
With the management console hosted by Sophos Cloud, there is no server set up and service can be deployed instantly, providing complete security coverage everywhere – simply. Sophos Cloud delivers all the essential endpoint protection a company needs without any of the complexity traditionally associated with security management. The service is also consistent with Sophos’ ongoing focus and commitment to be a “Channel First” company.
“The ability to administer our security with Sophos Cloud allows us to better manage our resources and enables us to effectively utilize our time and money. The service was easy for us to implement, and it seamlessly integrated into our environment,” said David Fox, IT Consultant, Neptune Terminals.
“Small and medium businesses are especially challenged regarding IT security. They are targets and must meet security best practices yet are resource constrained,” said Charles Kolodgy, Research Vice President for IDC.
“Sophos Cloud is a welcome addition. Its features can remove some of the complexity tied to security management thus allowing small and mid-market businesses to improve security without taxing their resources”. “As an organization that specializes in IT security and services, M3Corp has had a valuable partnership with Sophos for more than 4 years. Sophos Cloud will help us extend that partnership to quickly deliver cloud security that is easy to deploy and manage, while providing the most efficient and economical security solution to all of our customers throughout Brazil. M3Corp’s partnership with Sophos ensures that our customers will be fully protected from all types of threats,” states Antonio Mocelim, Sales Director, M3Corp.
Availability
Sophos Cloud is currently available. Online 30-day trials are available by visiting: www.sophos.com/cloud
With version 6.1 we’re addressing the two biggest issues in encryption – performance and usability – by leveraging native operating system (OS) encryption for better performance; and delivering multi-platform management across all devices and cloud environments.
SafeGuard Enterprise also solves the major challenge of managing encryption across multiple platforms, devices, and cloud environments. Users and IT staff are now able to share data safely between Windows, Mac and mobile devices – securing data wherever it lives and wherever it is sent.
Managing multiple devices no longer means managing multiple consoles, so IT can fully embrace encryption to support their users. The Sophos encryption approach enables users to safely work the way they need to – sharing files between users, partners and customers via the cloud and the devices they use.
Sophos is the only vendor to offer native device encryption, cloud, mobile, removable and file share encryption in one centrally managed solution, providing unmatched security, performance, and an intuitive user experience.
What’s New in SafeGuard Enterprise 6.1
- With SafeGuard Enterprise you can manage Microsoft BitLocker for Windows or Mac FileVault 2.
- Now with support for Windows 8, and file and disk encryption on Macs, SafeGuard covers more operating systems and platforms.
- Simplified keyring creation grants you seamless, centralized management. With this newest release, you can save time with our keyring creation that requires no repeat login.
- Use a single console to manage full-disk, removable media, file-share, and cloud storage encryption
- Get up-to-date security status for all your devices with reporting and auditing that lets you monitor and enforce compliance with internal policies and external regulations.
You can sign-up for a free 30-day trial here.
Jan
Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) were both designed to help counteract this issue by helping legitimate senders prove that their email isn’t forged. Now you can implement anti-spam rules in the Sophos Email Appliance that act on the presence or lack of both SPF and DKIM validation and you can even add your own DKIM signatures to outbound mail, providing an added layer of trust to email originating from your organization.
As you would expect, enabling SPF or DKIM policy rules couldn’t be simpler. With just a couple of clicks you can easily add sender validation using these frameworks to your spam evaluation criteria.
But that’s not all, with v3.8 we’ve also enabled wildcards for selecting sub-domains for “Select Users” and “Custom Groups” when setting up policy and a few more enhancements. This release also includes a patch for the OpenSSL man-in-the-middle vulnerability. You can read all about the updates in the release notes.
Sophos Email Appliance Documentation and Release Notes. Existing email appliance customers will receive this automatically during your next specified update window.
You can read the original article, here.
Jan
She writes: “I personally notified the very first bounty recipient via email today that his submission for the Internet Explorer 11 Preview Bug Bounty is confirmed and validated. (Translation: He’s getting paid.)“.
She hasn’t yet named names or put a price tag on the first recipient. In fact, there are already multiple researchers who’ll be receiving bounty payouts. MSRC plans to hook up those researchers who want to be publicly recognized for their contributions on an acknowledgement page on its bounty web site. “Stay tuned, as it will come soon“, Moussouris says.
What Microsoft can share at this point are these two key results:
- They’re getting more submissions, earlier. Microsoft has received more vulnerability reports in the first two weeks of its bounty programs than it typically would in an average month. It shows that the strategy for getting more vulnerability reports earlier in the release cycle is working, it says.
- They’re attracting new researchers. Researchers who’ve rarely, or even never, reported directly to Microsoft are now choosing to talk directly to the company. Microsoft interprets that as proof that its strategy to hear from people it usually doesn’t hear from is bearing fruit.
As Moussouris explains it, Microsoft was canny in how it chose to approach the vulnerability market. There’s the black market, where zero-day bugs fetch the highest prices. Then there’s the gray market, where bug-hunting mercenaries make a mint selling information about exploit techniques and unpatched vulnerabilities to corporations and nation states. Microsoft didn’t go there. Instead, it focused on the white market: the place where buyers are after vulnerability information for defensive use, whether it’s vendors themselves (via bounty programs) or a broker who uses the vulnerabilities for their own protection services or threat reports. Moussouris says that three years ago, white-hat bug hunters were passing up cash on the white market and were instead mostly coming to Microsoft directly. That changed over the past few years. Microsoft has witnessed researchers increasingly holding bugs back to see what the going rate might reach on the various markets, typically after Microsoft has released code to manufacturing. The way Microsoft figures it, it’s identified a gap in the market that its new bounty program is filling: namely, in the pre-release, or beta, period.
Moussouris writes: “It’s not about offering the most money, but rather about putting attractive bounties out at times where there are few buyers (if any)… Trying to be the highest bidder is a checkers move, and we’re playing chess“.
There is data out there that bolster Moussouris’ contention that strategically structured, well-timed bounty programs are a good investment. A study recently released by the University of California, Berkeley reports that paying bounties to independent security researchers is a better investment than hiring employees to do it. Piggy and mouse. Image from ShutterstockFor example, Google’s paid out about $580,000 over three years for 501 Chrome bugs, and Firefox has paid out about $570,000 over the same period for 190 bugs. Compare that with just one full-time salaried security researcher digging through code, at, say, $100,000 per year, and the savings can be huge.
You can read the original article, here.
Learn How Balance and MAX Routers Team Up for Unbreakable VPNs
The Balance lineup uses Peplink SpeedFusion technology to integrate seamlessly with MAX cellular routers and deliver unstoppable VPNs in a wide variety of applications. To see how, visit our updated Balance and Unbreakable VPN pages. Filled with helpful deployment diagrams and technology highlights, they’re a great way to learn more about fast, reliable, and affordable Peplink solutions for retail, enterprise, public safety, and much more.
You can read more here.