December 26 2017

An Interview with Aviram Jenik from Beyond Security

  Podcast Ep. 4 For our fourth and last podcast of the year, we are very happy to have Aviram Jenik, who has been involved in the fields of encryption, security vulnerabilities detection and research from the early days. Aviram is the founder of Beyond Security, a cyber security company that develops vulnerability assessment tools used by governments and companies worldwide to secure their network...
December 21 2017

Best practices for NextGen banking security

  By Hamid Karimi  Massive breaches in the finance industry have moved banks to wake up—albeit slowly—and view security in a different light. Meanwhile, the financial sector’s pace of innovation will surely accelerate: The resulting technology storm will sweep away fickle players who fail to fathom the ramifications for operations and security. This creates a see-saw dichotomy: As branch banking f...
December 17 2017

Hacked Pacemaker Anyone? By Hamid Karimi, December 17, 2017

  Recently the WannaCry ransomware crippled the U.K. National Health System (NHS) denying millions of patients’ access to their personal and privileged medical information. The proliferation of medical devices, networked and stand-alone, wired and wireless, represents the emergence of an attack surface ripe for exploitation by nefarious characters    
December 15 2017

Beyond Security Announces Six Security Predictions for 2018

  San Jose, CA June 15, 2017 – Beyond Security, a leading provider for automated security testing solutions including vulnerability management announced their cyber security predictions for 2018. “Beyond Security has been on the frontlines of detecting, assessing and managing security vulnerabilities since 1999. Our groundbreaking work in discovering hundreds of zero-day threats and bringing that ...
December 13 2017

A Holiday Message From Aviram Jenik - CEO and Co-Founder of Beyond Security

  The holidays are here again. This is the time for reflection on what we’ve accomplished so far as well as looking ahead towards the future on what still needs to be done. At Beyond Security, we measure ourselves by how well we help our customers reduce their security risks and help them mitigate their vulnerabilities. This year, we helped tens of thousands of organizations strengthen their netwo...
November 29 2017

How to protect your credit card online

  Keep your credit card details away from prying eyes and avoid fraudulent transactions with these tips for shopping online. It pays to protect yourself when shopping online to avoid getting more than you bargained for. With high-profile data breaches potentially affecting millions of people, here are some card-specific tips to keep in mind when virtually swiping your plastic.  
November 16 2017

4 Ways Life Changes When You Have a Security Clearance

  Serving your country comes at a price. For those in the military it can literally mean putting your life on the line. For those who serve the government in a civilian capacity it may mean restrictions on what you can say or where you can travel. A national security career offers many tangible benefits, but there are trade-offs. You will be asked to give up certain ‘liberties’ in the interests of...
November 14 2017

Cause for concern? Pro-ISIS hacking group targets 800 US school websites

    he latest target of pro-ISIS hackers is none other than 800 school websites across the United States. The widespread hack occurred last Monday, and lasted two hours, in which visitors were redirected to a YouTube propaganda video featuring Arabic audio, the text, “I love Islamic State (ISIS)” and images of former Iraqi dictator Saddam Hussein.     Cause for concern? Pro-ISIS hacking group targ...
November 07 2017

THE ROLE OF SECURITY ANALYTICS IN INFORMATION SECURITY PROGRAMS

      8 infosec pros and analytics experts reveal the role of security analytics in information security programs today.  Big data and analytics are impacting every industry in the modern landscape, and the security field is no exception. Analytics have tremendous promise in aiding ongoing enterprise efforts to identify anomalies and mitigate security breaches and cyberattacks before hackers are a...
November 02 2017

Data Theft: How Can Our Companies and Governments Lose So Much, So Often

      Hundreds of millions of financial and personal data records have been stolen in recent corporate and government data loss incidents. Equifax, in the greatest security breach in U.S. history, lost social security numbers, addresses, driver’s license information and such, for more than 143 million Americans.    
October 24 2017

Beyond Security Announces Technology Partnership with A.I. Corporation

    San Jose, CA. October 24, 2017- Beyond Security, a leading provider of automated security testing solutions including vulnerability management announced their technology partnership with A.I. Corporation (AIC) - a software solutions vendor for system design and development, that serves over 15 software makers by providing over 100 embedded software products and solutions in Japan.    
October 16 2017

Beyond Security Announces 3rd Hack2Win Competition at Code Blue Japan

    CUPETINO, CALIFORNIA, UNITED STATES, October 16, 2017 /EINPresswire.com/ --  Cupertino, CA October 16, 2017 – Beyond Security, a leading provider for automated security testing solutions including vulnerability management announced the 3rd Hack2Win Code Blue competition, with prize awarded up to $50.000 USD. The competition will be taking place in Tokyo, Japan from November 7 through 10th.    
October 12 2017

Data theft: How can our companies and governments lose so much, so often

    BY: BRIAN PEARCE – COO AND CMO OF BEYOND SECURITY Hundreds of millions of financial and personal data records have been stolen in recent corporate and government data loss incidents. Equifax, in the greatest security breach in US history, lost social security numbers, addresses, driver’s license information and such, for over 143 million Americans. Typical to most data loss incidents, there we...
October 09 2017

October is Cyber Security Awareness Month – Here are Five Effective Tips to Protect your Business from Cyber Attacks

  Cupertino, CA. Octo 9, 2017- To mark the month of October being Cyber Security Awareness Month, Beyond Security, a leading provider of automated security testing solutions including vulnerability assessment, released 5 effective and easy tips to follow for protecting against serious Internet security threats that can cause both financial and emotional damages. While the future remains uncertain ...
October 02 2017

A Serial Bootstrapper’s Journey: Beyond Security CEO Aviram Jenik (Part 1)

  Going against the grain of Venture Capital mania, in 1999, Aviram started his second bootstrapped venture. 18 years later, he is still running it. Happily! Sramana Mitra: Let’s start at the very beginning of your journey. Where are you from? Where were you born, raised, and in what kind of background? Aviram Jenik: I was born and raised in Israel. I moved to California about 10 years ago. I spen...
September 28 2017

The buzz on fuzzing — finding uncommon vulnerabilities

  WRITTEN BY: HAMID KARIMI APPLICATION PROLIFERATION EQUALS ATTACK EXPONENTIAL Rapid adoption of cloud computing and web services has resulted in myriad use cases in all market segments. These use cases are governed by purpose-built applications running on many operating platforms. Application development is on a rapid growth path and this phenomenon creates a perfect security storm; as the number...
September 26 2017

Three Crucial Criteria to Avoid Cyber Security Pitfall

  Security Expert from Beyond Security, Hamid Karimi’s Recommendation for safeguarding critical data CUPETINO, CALIFORNIA, UNITED STATES, September 26, 2017 /EINPresswire.com/ -- Cupertino, CA. September 26, 2017- Beyond Security, a leading provider of automated security testing solutions including vulnerability assessment, released three crucial criteria in protecting against serious Internet sec...
September 18 2017

Equifax data breach could have long-reaching effects for borrowers

  Ryin Gaines and his family know all too well what can happen if your identity is stolen. “My wife had to jump through hoops for over a decade to settle all of the damage that was caused,” said Gaines, 35, of Pittsburgh.    
September 18 2017

Hacking Medical Devices A Cause for Insomnia By Hamid Karimi

  Imagine you are on a hospital bed attached to devices and sensors that a malintent individual across the world can digitally find and manipulate. This is a nightmare scenario. By some accounts, a typical intensive care bed has more than a dozen sensors, most of which are network connected, and at least few of them are connected to the Internet.   
September 12 2017

Why the Equifax Leak Should Scare the Hell Out of You

  Even to grizzled cybersecurity experts, the scale of Equifax’s massive data leak is dumfounding. With a treasure trove of information compromised — including social security numbers, addresses, birthdays and driver licenses — Equifax’s failure to secure data has put 143 million Americans at risk of fraud. The Equifax case is potentially far more devastating than recent high-profile hacks of Sony...
August 29 2017

Your website is a window into your network — and guess who’s looking?

  GUEST POST BY BRIAN PEARCE Web servers by design open a window between your network and the world. The care taken with server maintenance, web application updates, and website coding will define the size of that window, limit the kind of information that can pass through it and thus establish the degree of web security you will have. Websites and the servers that host them are vulnerable to atta...
August 24 2017

TIME TO GET MORE SOPHISTICATED WITH DEFENSE STRATEGIES AGAINST MALWARE

  WHY YOU’RE MORE LIKELY TO BE HIT BY LIGHTNING THAN A ZERO-DAY ATTACK By Brian Pearce Malware defense practices have been focused on reactive technologies: intrusion detection, content filtering, detecting and blocking files and such. Most of these solutions require draconian settings to block malware well and user complaints about the resulting restrictions eventually wear down admin resistance....
August 21 2017

3 Questions With Aviram Jenik of Beyond Security

  FintekNews is pleased to offer our weekly feature column “3 Questions With”. Each week, we feature a thought leader within a unique sector of fintech and ask them to answer just 3 questions for our audience in their vernacular. This week, we’d like to introduce you to Aviram Jenik of Beyond Security, which develops tools that test networks, software and web applications for security weaknesses. ...
August 18 2017

In Vulnerability Assessment, Accuracy is Vital

  Overlooking a vulnerability (a false negative) leaves a security flaw you are not aware of and can be potentially damaging if discovered by an attacker. Reporting that a vulnerability exists when it doesn't (false positive) is a waste of time. It is important for a solution to find the vulnerabilities but an inaccurate report can be more trouble than it's worth.     
August 18 2017

HBO Hacks and Leaks: How Much Have They Hurt the Business?

  HBO has endured an uncomfortable bummer of a summer of hacks and episodes of original series leaking out into the internet wild, including from its tentpole “Game of Thrones” franchise. The cyber-chaos — whether driven by money, mischief, malice or just plain mistakes — may well continue: It’s possible that whoever was behind the massive hack of the programmer’s networks perpetrated in July has ...
August 17 2017

Google Chrome remote code execution flaw detailed, PoC released

  Vulnerability broker Beyond Security has released details about and Proof of Concept code for a remote code execution bug affecting Google Chrome. “The [type confusion] vulnerability results from incorrect optimization by the turbofan compiler, which causes confusion between access to an object array and a value array, and therefore allows to access objects as if they were values by reading them...
August 11 2017

Beyond Security’s Co-Founder Noam Rathaus Recognized as one of the Top MSRC 100 Security Specialists in the Industry

  CUPETINO, CALIFORNIA, UNITED STATES, August 11, 2017 /EINPresswire.com/ --  Cupertino, CA July 11, 2017– Noam Rathaus, CTO and Co-Founder of Beyond Security, a leading provider of automated security testing solutions, including vulnerability management, has been named as one of the top 100 security specialists in the industry on the prestigious Microsoft Security Response Center list. This list ...
August 09 2017

Contributor: Insecurity in Medical Devices can be Cause for Insomnia Hamid Karimi, VP of Business Development at Beyond Security

  Imagine a hospital bed attached to devices and sensors that a malintent individual across the world can find and manipulate. This is a nightmare scenario. By some accounts, a typical intensive care bed has more than a dozen sensors, most of which are network-connected, and at least few of them are connected to the internet.  
August 08 2017

Powered by Beyond Security’s AVDS, ScanMyServer - Free Testing Solution is the First Defense against Security Weaknesses

Powered by Beyond Security’s AVDS, ScanMyServer - Free Testing Solution is the First Defense against Security Weaknesses CUPETINO, CALIFORNIA, UNITED STATES, August 8, 2017 /EINPresswire.com/ --  Cupertino, CA August 8, 2017 – Beyond Security, a leading provider for automated security testing solutions, including vulnerability management, encourages businesses and organizations to take advantage o...
August 04 2017

IoT security for healthcare is in critical condition

IoT security for healthcare is in critical condition Medical devices lack many features and capabilities that help protect other network-attached devices from attack By Jon Gold (Network World)   IoT security is a headache, a mess and several other flavors of annoying for any enterprise, but in healthcare, it can be literally life and death. Compromising any connected device has two main consequen...
August 01 2017

Taking the Entertainment Industry for a Ride is more than a Game

By Hamid Karimi     The entertainment   industry  has been taken hostage- literally. America's soft power that has manifested in its entertainment industry prowess, is now under siege by a slew of nefarious actors. One can walk on the streets of underdeveloped or developing countries and find pirated copies of blockbuster movies or the latest music albums.   However, there is a paradigm shift from...
July 20 2017

Hackers Stole $37 Million In Ether Heist, Raises Questions About Cryptocurrency Security

By BY LEIGH CUEN From   International Business TImes   Unknown hackers stole $37 million worth of ether from Tuesday to Wednesday, Gizmodo reported. A group of white hat ethical hackers quickly countered to protect the remaining funds Here’s a very short and oversimplified version of what happened, based on what experts told International Business Times: Ethereum’s contract writing language makes ...
July 20 2017

Beyond Security Announces Winners of Hack2Win 2017

    CUPETINO, CALIFORNIA, UNITED STATES, July 20, 2017 /EINPresswire.com/ --  Cupertino, CA Juley 19, 2017 – Beyond Security, a leading provider for automated security testing solutions including vulnerability management has announced the winners of 2017 Hack2Win, online hacking competition, with grand prize awarded for $5000 USD. “The rules were very simple. You needed to hack the D-link router (...
July 19 2017

Beyond Security’s beSTORM® Software Security Testing Receives ISCI Control Systems Cybersecurity Certification

  CUPETINO, CALIFORNIA, UNITED STATES - beSTORM® Software Security Testing Tool from Beyond Security Receives EDSA 2.0.0 and SSA 2.0.0 ISASecure® Control Systems Cybersecurity Certification Cupertino, CA July 18, 2017, 2017 – Beyond Security, a leading provider for automated security testing solutions including vulnerability management, announced that its software security testing tool, beSTORM®, ...
July 13 2017

Security and industrial control systems: unlikely bedfellows

  Written by Hamid Karimi, Beyond Security ----   Isolation as a complete security solution for industrial control systems (ICS) is dead. ICS suffers from the use of obsolete, but seemingly irreplaceable, software and a flat network design. Other enterprise networks have responded to security threats by deploying the most current operating systems and application versions, network segmentation and...
July 12 2017

Your industrial control system is vulnerable to cyber attack Take stock of your assets and regularly assess vulnerabilities.

  By Hamid Karimi ---- Manufacturers beware – your industrial control systems (ICS) are vulnerable to cyber attack. Isolation as a complete security solution won’t work. Other enterprise networks have responded to security threats by deploying the most current operating systems and application versions, network segmentation and best of breed defenses. ICS suffers from the use of obsolete but seemi...