article thumbnail

Bulletproofing your threat surface with the Microsoft security ecosystem

CIO

Since Satya Nadella took the helm in 2014, Microsoft has doubled down on its support for non-Microsoft technologies. Partnerships are especially important in the cybersecurity realm, as Microsoft’s core strengths in its own technologies reinforce long-standing “Microsoft shop” silos.

Azure 194
article thumbnail

6 cybersecurity revelations from the redacted Mueller report

The Parallax

The report also contains several important new cybersecurity revelations regarding interference by Russia in the 2016 election, and by the Trump administration in the ensuing investigation. By the spring of 2014, the IRA began to consolidate U.S. Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’.

Report 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How China’s synthetic media startup Surreal nabs funding in 3 months

TechCrunch

The company is merely three months old but has already secured a seed round of $2-3 million from two prominent investors, Sequoia China and ZhenFund. “Fundamentally, I think [synthetic media] provides a disruptive infrastructure. One of the startups building this technology is China-based Surreal. Uncharted territory.

Media 195
article thumbnail

Singapore-based logistics startup Ninja Van secures $578M Series E

TechCrunch

The latest round topped at a valuation of more than $1 billion prior to a potential initial public offering as early as next year, according to media reports. Founded in 2014, the company operates its business across Singapore, Malaysia, Indonesia, Thailand, Vietnam, and the Philippines. It currently employs more than 61,000 staff.

Groups 245
article thumbnail

Nextgov Enables Examination Of Big Data’s Role in Cybersecurity

CTOvision

Three highly regarded community technologists will meet in a NextGov morning event 3 June 2014 to examine Big Data’s Role in Cybersecurity. Even now, agencies are sharing threat analyses with security partners and using analytics to monitor network traffic to detect threats in real-time. June 3, 2014. Speakers: .

Big Data 109
article thumbnail

Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’

The Parallax

The final charge, against GRU officers Anatoliy Sergeyevich Kovalev and Aleksandr Vladimirovich Osadchuk, alleges conspiracy to violate the CFAA, and specifically to steal information from computers used by officials in the 2016 election—including data on 500,000 voters from an unnamed state board of elections. political campaigns.

Malware 151
article thumbnail

Stop the Presses: Media Coverage as a Prioritization Metric for Vulnerability Management

Tenable

We wondered whether mainstream media coverage of vulnerabilities changed how companies perform vulnerability management. 2018 was a big year for vulnerabilities in the media. 2018 was a big year for vulnerabilities in the media. High-profile vulnerabilities are not just a concern for security teams. So we asked them.

Media 77