Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Intel Security Report Details Challenges Slowing Response to Targeted Attacks
Newest First  |  Oldest First  |  Threaded View
AdamF018
AdamF018,
User Rank: Apprentice
11/6/2015 | 12:35:17 PM
Re: Intel Smokescreen
Obviously you haven't done your research into the new strategy of Intel Security around the Threat Defense Life Cycle, moving products to the cloud, or understand that providing an integrated platform is the future of security.

Simply misrepresenting information to "troll" is poor journalism! Next time have some facts before posting an article.

  
SecMaster
SecMaster,
User Rank: Apprentice
11/5/2015 | 11:06:16 AM
Intel Smokescreen
Intel has a lot of people fooled because of their slick PR and paid-for analyst reports.  The reality is that much of their old security business has failed and they had sold or given that away (Firewalls, email, Mobile security). Intel failed at mobile security and two firewall company acquisitions.  Oddly, the email security business which is quite competitive and important they are giving away to Proofpoint, So at this point they are not a viable security partner except for Advanced threat control.  Not a bad place to be (ala FireEye), but hardly a player in the big picture. They are a point solution player now with the main focus of the security group to serve the chip business.

So, the remaining security solutions don't really fit the chip business model or wallstreet multiples.  My guess is that they spin off the Advanced threat business once they complete the integration of pieces and remain the chip manufacturer they are.  Semiconductor companies can't help but destroy any serious value add they own since the focus is on how many chips can we sell. Security was and will be a failed experiment for Intel.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building the SOC of the Future
While an attacker just needs to find one vulnerability to get in to the network, the defender has to look everywhere. Defenders have to identify, disrupt, and stop attacks in the short period of time between when an attacker gets in and causes damage. One way is a security operations center to get that "all the time" coverage. What's Inside: --AI and cybersecurity response --Automation --Proctive threat hunting --Next-gen SIEM
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-3276
PUBLISHED: 2022-10-07
Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.
CVE-2022-41574
PUBLISHED: 2022-10-07
An access-control vulnerability in Gradle Enterprise 2022.4 through 2022.3.1 allows remote attackers to prevent backups from occurring, and send emails with arbitrary text content to the configured installation-administrator contact address, via HTTP access to an accidentally exposed internal endpoi...
CVE-2022-31680
PUBLISHED: 2022-10-07
The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.
CVE-2022-31681
PUBLISHED: 2022-10-07
VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.
CVE-2022-3275
PUBLISHED: 2022-10-07
Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.