Sean Michael Kerner

About

Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

Oracle Patches 334 Flaws in July Critical Patch Update

Oracle released its latest Critical Patch Update on July 18, fixing 334 vulnerabilities across the company’s product portfolio. The company rated 61 of the vulnerabilities as having critical impact. Among the products patched by Oracle are Oracle Database Server, Oracle Global Lifecycle Management, Oracle Fusion Middleware, Oracle E-Business Suite, Oracle PeopleSoft, Oracle Siebel CRM, Oracle […]

Mimecast Looks to Secure Web Traffic With DNS Security Gateway

Mimecast announced on July 18 that it is developing a new Domain Name System security gateway that is now available to members of the company’s early adopter program. The DNS Security Gateway is an expansion of the Mimecast portfolio beyond the company’s email security services that protect against spam and phishing attacks. With the DNS Security […]

McAfee Announces Mvision Enterprise Cyber-Security Technology

McAfee is refreshing its enterprise cyber-security portfolio with both a new vision and a new lineup of products, which were announced on July 17. The McAfee Mvision product portfolio includes ePolicy Orchestrator (ePO), as well as endpoint and mobile products. The goal is to help make it easy for organizations to include, orchestrate and control […]

Symantec Improves Email Security With Threat Isolation Technology

Symantec announced its Email Threat Isolation technology on July 17, providing organizations with new capabilities to help block advanced email attacks. According to Symantec, Email Threat Isolation blocks advanced email attacks on end-user devices and protects users against spear phishing, credential theft, account takeover and ransomware attacks. Symantec built Email Threat Isolation to secure email links […]

Optiv Security Launches Privileged Access Managed Service

Optiv Security announced its Privileged Access Managed Service on July 16, which benefits from a technology integration with privileged access security vendor CyberArk. The new service pairs CyberArk’s technology with Optiv’s cyber-security management platform, providing an overall approach to help organizations manage and secure privileged access management. Optiv will manage customers’ existing CyberArk deployments or help […]

Business Email Compromise Losses Top $12B, FBI Warns

Among the most impactful cyber-attacks is business email compromise (BEC), where criminals trick unsuspecting organizations into paying fraudulent invoices. The FBI has calculated the estimated impact of BEC attacks that it is aware of and has determined that between October 2013 and May 2018, there has been $12.5 billion in global losses. During that period, the […]

How The Update Framework Improves Software Distribution Security

In recent years that there been multiple cyber-attacks that compromised a software developer’s network to enable the delivery of malware inside of software updates. That’s a situation that Justin Cappos, founder of The Update Framework (TUF) open-source project, has been working hard to help solve. Cappos, an assistant professor at New York University (NYU), started TUF […]

Linux Foundation Brings Power of Open Source to Energy Sector

The Linux Foundation launched on July 12 its latest effort—LF Energy, an open-source coalition for the energy and power management sector. The LF Energy coalition is being backed by French transmission system operation RTE, Vanderbilt University and the European Network of Transmission System Operators (ENTSO-E). With LF Energy, the Linux Foundation is aiming to replicate the […]

Critical Bug Bounty Reports on the Rise, HackerOne Finds

HackerOne released its 2018 Hacker-Powered Security Report on July 11, providing insights into the current state of the bug bounty marketplace. The report is based on 78,275 security vulnerability reports that HackerOne received on its managed bug bounty platform, which handles programs for more than 1,000 organizations. The 46-page report reveals that the average bug bounty […]

CISOs Have Limited Corporate Influence, Accenture Reports

Chief information security officers are responsible for developing and establishing cyber-security strategies and policies with their organizations. Yet, according to a new study from Accenture Security, many organizations don’t give their CISOs the resources they need and few CISOs have the required influence within enterprises to effect change. The Securing the Future Enterprise Study Today-2018 […]