Cyber Defense

Duo Security, CyberArk Expand Cybersecurity Packages

ANN ARBOR - Duo Security’s flagship zero-trust product – Duo Beyond – now integrates with the CyberArk Privileged Access Security Solution, empowering organizations to evaluate the security hygiene of a device before granting access to further extend security and reinforce consistent policy enforcement. The pact was announced this week. The integration also gives organizations the

By |2018-07-20T09:41:04-04:00July 20th, 2018|Cyber Defense, ESD|

CNET Details How Russian Hackers Infiltrated The DNC Computers

WASHINGTON DC - In the months leading up to the 2016 US presidential election, Russian hackers ran a sophisticated campaign, infecting more than 30 computers and stealing more than 50,000 emails, in an effort to sway the vote in Donald Trump's favor. On Monday, President Trump met with Russian President Vladimir Putin and denied the

By |2018-07-19T20:10:32-04:00July 19th, 2018|Cyber Defense|

Congress Upset Not Told Immediately About Spectre, Meltdown Vulnerabilities

WASHINGTON DC - The US government wishes it had gotten the memo on Spectre and Meltdown sooner. On Wednesday, the Senate Committee on Commerce, Science and Transportation held a hearing on cybersecurity issues related to the Spectre and Meltdown vulnerabilities, which left hundreds of millions of computer chips open to attacks. The Spectre and Meltdown flaws were

By |2018-07-18T17:55:47-04:00July 12th, 2018|Cyber Defense, Politics|

Chrome Tweak Helps Keep Spectre Hackers Away

SAN FRANCISCO - By adding new compartmentalization technology, Google's Chromebrowser has taken a step to keep websites from stealing sensitive data. Since Google first released it publicly in 2008, Chrome has divided work among multiple computing processes. That approach helps keep one tab's work from interfering with what's happening in another. Google has been testing a stricter

By |2018-07-12T19:22:39-04:00July 12th, 2018|Cyber Defense|

Report: Google, Facebook Tricking Users Into Sharing Personal Information

SAN FRANCISCO - Google and Facebook are allegedly tricking European users into sharing more personal information than they know.  A consumer advocacy report by the Norwegian Consumer Council, out Wednesday, said the companies are using "dark patterns," or designs and user interfaces to trick users into unintentionally taking an action, to nudge people "toward the least privacy friendly options to a degree

By |2018-06-29T10:30:12-04:00June 29th, 2018|Cyber Defense|

Cyber Risk Insurance – Does Your Company Have The Right Plan In Place?

LANSING - How does your company use technology in its day-to-day operations?  If you are like most, you buy and sell products or raw materials, intellectual property is stored on-line, you communicate with customers and vendors and promoting your business via social media are simply part of your day.  Unfortunately, each of these actions provides

By |2018-06-14T15:17:00-04:00June 14th, 2018|Cyber Defense, Small Business Association of Michigan|

Duo Security Names Welch President, COO

ANN ARBOR – The Ann Arbor cybersecurity products and services developer Duo Security has named veteran technology industry executive Welch as its president and chief operating officer. Duo officials said Welch brings more than 25 years of experience to Duo after holding successful senior leadership positions with technology giants such as Zscaler, HP, Symantec, and

By |2018-06-12T19:17:21-04:00June 12th, 2018|Cyber Defense, Featured|

U-M Researchers Building System To Keep Confidential Data In Trustworthy Hands

ANN ARBOR—When news of the Cambridge Analytica scandal broke, 87 million Facebook users learned that their personal data was obtained and used by a British research firm to influence the outcome of the 2016 U.S. presidential election. Many were left wondering how data accessed by established researchers could have been used inappropriately and

By |2018-06-08T12:06:47-04:00June 8th, 2018|Cyber Defense, Featured|

North Korea is using Microsoft, Apple, Samsung tech in cyberattacks

SAN FRANCISCO - Researchers at Recorded Future, a threat intelligence company, said in a report Wednesday that North Korean hackers have used technology from Microsoft, Apple and Samsung to carry out cyberattacks. The isolated country has been behind major cyberattacks, including the 2017 WannaCry ransomware assault, which locked up thousands of computers across 150 countries and ensnared hospitals, universities and airports

By |2018-06-08T09:54:36-04:00June 8th, 2018|Cyber Defense|