Monthly Archives: September 2014

Citrix Systems Looks Well-Positioned to Deliver Growth – GuruFocus.com

Citrix Systems Looks Well-Positioned to Deliver Growth
GuruFocus.com
Citrix System believes that its XenDesktop, XenApp and XenMobile to certainly drive growth for its Apps and Desktop as a service category in the future. Earlier Citrix System had integrated its AppDNA capabilities in order to minimize cost and

from xenmobile – Google News http://ift.tt/1sFcBKf
via IFTTT

Advertisements
Tagged , , ,

How SaaS Adoption Is Changing Cloud Security

Sanctioning cloud-based services requires a new approach to security that "assumes breach" and accounts for the limitations of endpoint and perimeter defenses.

from Dark Reading: http://ift.tt/YcVT6O
via IFTTT

Tagged , ,

Israel Announces New Cyber Security Body

PM Netanyahu says authority will act as an ‘air force’ to shoot down new threats.

from http://ift.tt/1B3WoNc
via IFTTT

Tagged , ,

One in Three UK Employees Are Disappointed With Their Job

StressAs we enter the run-up to the final recruitment period of the year, Glassdoor Job Expectations research reveals that many job hunters invest very little time researching new employers before accepting a job offer. In fact, across the UK, employees admitted they spent an average of just four hours looking at potential employers and just […]

One in Three UK Employees Are Disappointed With Their Job is a post from: Glassdoor Blog

from Glassdoor Blog http://ift.tt/1mOLnyh
via IFTTT

Tagged , , ,

Citrix acquires Virtual — could a VMI product be on its way? – TechTarget

Citrix acquires Virtual — could a VMI product be on its way?
TechTarget
Citrix has its own mobile applications as part of XenMobile and Worx, so the company could benefit from a tool that lets it test and secure applications on as many devices as possible. Citrix can also put the ARM-based hypervisor to use with its many

from xenmobile – Google News http://ift.tt/1Cc3m5g
via IFTTT

Tagged , , ,

Kinvey’s Mobile App Focus and Fit in the New Stack Helps the BaaS Platform Raise $10.8M

The backend as a service market (BaaS) found a monster competitor in its midst when Amazon Web Services entered the market earlier this year. There were the usual declarations that AWS would bury the competition with the new AWS Moble Service. AWS does indeed look formidable but Kinvey’s news today that it has just raised […]

from The New Stack http://ift.tt/1rmeTv1
via IFTTT

Tagged , , ,

Microsoft cloud protection

​Microsoft is using cloud protection to help keep our customers safe. In fact, nearly any detection made by Microsoft security products could be the result of cloud protection. Software developers often ask us how this cloud protection works and how they can improve our cloud’s impression of their software.

How our cloud protection works

When our antimalware products encounter anything unusual, they can send a small packet of information about the event or file to our server. The server then sends back a reply telling the antimalware software whether to block it or not. It can also request a sample for further analysis.

There are three situations that highlight the benefits of cloud protection:

  • If a file is known to be malware by our servers but not by the local antimalware product, the cloud protection module can tell the local product to block or remove it.
  • If a file is known to be clean by our servers, but the local antimalware product detects the file as malware (an incorrect detection situation), the cloud protection module can tell the local antimalware to not detect it, and the incorrect detection does not affect the user.
  • If a local antimalware product encounters a file that we don’t know about, our server can make a determination based on probabilities, and tell the local antimalware software to block it, even without having seen a copy of the file.

It’s this third point that I would like to discuss further.

Improving your software’s cloud impression

We are often asked by software vendors if we have a way for them to pre-whitelist their software. However, our backend processing actually works better if we see your software as it’s naturally distributed. I will outline a few methods to improve our cloud’s impression of your software below:

  • Digitally sign your software using a method accepted by Microsoft. This is the fastest way to get a good cloud reputation because the reputation of a good file can be distributed to all files signed by the same key.
  • Once you have digitally signed your software, be careful that malware isn’t also signed by your key. This will negate any good reputation. You can help avoid this situation by:
    • Making sure you protect your key from being stolen by malware authors.
    • Ensuring your development process prevents a parasitic file-infecting virus from being inadvertently signed by your key.
    • Reading more about the best practices for signing software.
  • If you can’t digitally sign your software, be aware that every minor version of your product will have to build reputation from scratch. This affects vendors who provide a different file on every single download. It doesn’t mean you can’t make bug-fix versions, different languages, etc.
  • Make sure your software doesn’t install malware:
    • Take care to avoid security vulnerabilities. Even if you don’t intend to install malware, a security vulnerability could be detected as your product installing malware.
    • If you download executables off the internet, have your software check a digital signature or cryptographic hash, to ensure it has the correct file you intended it to download. We have seen one case where a popular installer had some URLs distributing malware and we had to detect every one of their installers in case it was downloading one of the malware URLs.
  • Make sure your software isn’t installed by malware:
    • Proactively check your affiliates and companies who bundle your software.
    • Fill out the metadata information such as the information about the author and company in the file resources. If this and the digital signature isn’t enough, consider adding contact information, or a pointer to find contact information on the web. This contact information should direct to the right contact to report a security vulnerability, or work with to fix or prevent a incorrect detection.
  • If you use a runtime packer or obfuscator, you need to be aware that the majority of malware is packed or obfuscated, and this does affect how your software is seen at the back end.
  • Consider how your software is seen and whether it’s installed on the machines of users who really want it. We have honeypots, web crawlers, and automatic software testing. We can look at whether users chose to continue the download after the warning that a program isn’t commonly downloaded. We can also see whether users chose to ignore or remove software if our antimalware detects it. Bad behavior can quickly ruin a good software reputation.
  • There are some behaviors that, while not enough to warrant a detection on their own, do attract the suspicion of human and automated systems. They could be used for legitimate reasons, but are often closely associated with malware behavior. This includes:
    • Installing outside the commonly accepted folders for the type of software.
    • Modifying or adding a sensitive registry key.
    • Process or thread injection.
    • Autonomous internet activity.

If you believe we have made an incorrect detection for your product you can submit a developer contact form. Making a slight change and pushing it out to your software won’t necessarily address any incorrect bad reputation applied to the code signing key you used for the file that was incorrectly detected. Our cloud protection might also note the similarity between the file that it still believes was correctly detected as malware, and the new version.

MMPC

from Microsoft Malware Protection Center http://ift.tt/1C6IufE
via IFTTT

Tagged , , ,

Custom Theming for Office 365 for Nav Toolbar

Today I finally was able to setup a custom theme for my Office 365 Navigation Toolbar! It is very easy to do this, log into your Office 365 tenant as a global admin. Caveat: I have First Release Enabled on […] ↓ Read the rest of this entry…

from Office 365 Evangelist http://ift.tt/1pXcn9a
via IFTTT

Tagged , , ,

Cisco, FireEye Announcements: A Microcosm of the Enterprise Cybersecurity … – Network World

Cisco, FireEye Announcements: A Microcosm of the Enterprise Cybersecurity
Network World
ust as the leaves started to turn here in New England, I headed out to the Silicon Valley last week to present at an IT event. While I was in California, there were two announcements that illustrate the state of the cybersecurity industry. First, Cisco

from cybersecurity – Google News http://ift.tt/1tRL32v
via IFTTT

Tagged , ,
%d bloggers like this: