“And even a breach such as the one at the NSA could have been detected by Aorato. “Snowden reportedly used colleagues’ passwords to access sensitive docs,” Aorato’s co-founder and CEO, Idan Plotnik, notes to me. “Even if the user activity seems legitimate, the same account would actually present suspicious or abnormal behavior behind the scenes which Aorato would detect.”
“Plotnik says that this kind of behavioral detection — constantly shifting parameters — is part of a new trend in threat detection and online security: it prevents the problems of flagging non-malicious activity as malicious, and second, it detects the threats in real-time, as they actually change themselves.”
More from Techcrunch.com by clicking here: http://techcrunch.com/2014/01/21/aorato/
Ted Schlein of KPCB: “We are in midst of cybersecurity technology being completely re-made – moving from a signature-based protection environment to a more behavioral anomaly-based protection environment.”
Video interview by clicking here: ted-schlein-cybersecurity-vs-privacy-517928975
A Cisco security report released on January 16th 2014 shows that hacker threats reached “startling levels” last year and that the world is suffering from a shortage of skilled computer defenders.
Cracks in defenses and weapons for attacks rose to the highest levels since tracking began in 2000, while there was a worldwide shortage of nearly a million skilled security professionals to protect networks and machines, according to the annual Cisco report.
“To truly protect against all of these possible attacks, defenders must understand the attackers, their motivations and their methods before, during and after an attack,” said Cisco Threat Response Intelligence chief security officer John Stewart.
“Although the Cisco Annual Security Report paints a grim picture of the current state of cyber security, there is hope for restoring trust in people, institutions and technologies – and that starts with empowering defenders with real-world kn ..
Call it the attack of the zombie refrigerators.
Computer security researchers said this week they discovered a large “botnet” which infected Internet-connected home appliances and then delivered more than 750,000 malicious emails.
The California security firm Proofpoint, Inc., said hackers managed to penetrate home-networking routers, connected multi-media centers, televisions and at least one refrigerator to create a botnet or platform to deliver malicious spam or phishing emails from a device, usually without the owner’s knowledge.
Proofpoint said the case “has significant security implications for device owners and enterprise targets” because of massive growth expected in the use of smart and connected devices, from clothing to appliances.
“Proofpoint’s findings reveal that cyber criminals have begun to commandeer home routers, smart appliances and other components of the Internet of Things and transform them into ‘thingbots,'” to carry out the same kinds of attacks normally associated with personal computers.
More from NDTV Gadgets by clicking here
“Ninety-seven percent of Fortune 500 companies have been hacked,” says Peter W. Singer, “and likely the other 3% have too, they just don’t know it.” Such is the less-than-rosy picture painted by Singer — director of the Center for 21st Century Security and Intelligence at D.C. think tank Brookings Institution
“This is now a very real problem, one that we have to recognize, that we have to manage,” Singer says in a conversation with Fortune. “Stop looking for others to solve it for you, stop looking for silver bullet solutions, and stop ignoring it.”
I would argue that there’s no issue that’s become more important that’s less understood than cyber. You can see this gap in all sorts of areas, including on the business side. For example, 70% of business executives have made a cybersecurity decision for their company. Not 70% of CTOs or CSOs, but 70% of executives in general. Yet no major MBA program teaches on it.
More from CNN.com by clicking here: http://tech.fortune.cnn.com/2014/01/06/cybersecurity-and-cyberwar/