- Los dispositivos Galaxy S10e, Galaxy S10, Galaxy S10+ y Galaxy S10 5G han recibido la cualificación.
- A esta lista se suman los Galaxy S8 y S9, además del Galaxy Note 8, todos ellos aptos para ser utilizados en sistemas alineados con el Nivel Alto del Esquema Nacional de Seguridad (ENS).
Todos los dispositivos de la familia de 'smartphones' Samsung Galaxy S10 --el Galaxy S10e, Galaxy S10, Galaxy S10+ y Galaxy S10 5G--, han recibido la certificación de seguridad otorgada por el Centro Criptológico Nacional (CCN).
El modelo Samsung Galaxy S10 5G, es el primer dispositivo del mercado con tecnología 5G cualificado por el CCN, institución asociada al Centro Nacional de Inteligencia (CNI), según ha anunciado Samsung Electronics este jueves en un comunicado.
El fabricante surcoreano es actualmente el único con equipos cualificados por el CCN dentro del Catálogo de Productos de Seguridad de las Tecnologías de la Información y la Comunicación, supervisado por el CCN. A esta lista suman los Galaxy S8 y S9, además del Galaxy Note 8, siendo todos aptos para ser utilizados en sistemas alineados con el Nivel Alto del Esquema Nacional de Seguridad (ENS).
"Somos el único fabricante que ha superado esta evaluación de seguridad, y con la suma del Samsung Galaxy S10 5G ya contamos con equipos preparados para utilizar la tecnología 5G, manteniendo los máximos estándares de seguridad del mercado", ha afirmado el vicepresidente corporativo de Samsung Electronics, Celestino García.
Más información:
Samsung Newsroom España (22/08/19)
COPE (22/08/19)
Accelerating VMware’s Vision for Intrinsic Security By now you will have seen the announcement of our intent to acquire Carbon Black. This is a major milestone for VMware and for the security industry at large. It is also the culmination of several years of work executing on our vision and strategy for security. Carbon Black The post VMware Announces Intent to Acquire Carbon Black appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/08/vmware-announces-intent-to-acquire-carbon-black.html
Discovery Phase and Protected Mode VMware AppDefense learns your data center’s (good) behaviors during the Discovery phase of deployment. This phase typically lasts between 2-3 weeks and provides users with visibility into all the processes and network connection details in their environment, along with guest integrity checks for security and/or infrastructure engineers. After a The post VMware AppDefense Alert & Events Types appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/07/appdefense-alert-types.html
Things to note before upgrading It is easy to upgrade AppDefense to the vSphere Platinum version if you have already deployed AppDefense prior to upgrading to 6.7u1. With the Platinum version you will be able to view the AppDefense plug-in (on-premise) in vCenter. This will allow you to easily deploy the AppDefense module to The post Upgrading from AppDefense to vSphere Platinum appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/08/upgrading-from-appdefense-to-vsphere.html
VMworld for Security-minded Professionals With less than two months away, VMworld 2019 is quickly approaching and there is never enough time to prepare (register here if you haven’t). Moreover, it is always a struggle having to prioritize certain sessions over others and frustrating knowing that you simply cannot attend all of them! However, The post VMworld 2019: Top 10 Security Sessions (and 2 Keynotes) You Must Watch appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/07/vmworld-2019-security.html
Whitelisting and Blacklisting in AppDefense VMware AppDefense provides deeper visibility into data center endpoints by providing information of each process running inside application servers along with their network connection details. With greater visibility into application servers, AppDefense can be used to manage processes across your environment to have granular control over what should be The post Managing Processes with VMware AppDefense appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/07/managing-processes-with-vmware-appdefense.html
Updating VMware Tools for VMware AppDefense VMware AppDefense requires the installation of a guest module that comes included with VMware Tools 10.3.2 and above. VMware Tools 10.3.2 is only included in ESXi 6.7 U1+ and VMware Tools 10.3.5 is only included in ESXi 6.5 P03+. This means that it may be necessary to update The post Preparing to Upgrade VMware Tools for VMware AppDefense appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/07/preparing-to-upgrade-vmware-tools-for-vmware-appdefense.html
Greetings from the VMware Security Response Center! We wanted to make you aware that NVIDIA has released a security bulletin entitled NVIDIA GPU Display Driver – August 2019 documenting CVE-2019-5685. This CVE has been shown to affect VMware ESXi, Workstation and Fusion. Therefore, we wanted to make sure you were informed of this issue so The post Security updates NVIDIA GPU Display Driver – CVE-2019-5685 appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/08/security-updates-nvidia-gpu-display-driver-cve-2019-5685.html
We all roll our eyes when we see and hear the next buzz word wondering, will it change the world or just be another word that comes and goes. Buzz words have so many meanings, depending on who is using them or trying to sell the next widget. So what is micro-segmentation and zero The post Micro-segmentation and Zero Trust: Why all the Hype? appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2019/06/micro-segmentation-and-zero-trust-why-all-the-hype.html
In mid-May 2019[1], Microsoft released a security advisory to patch a specific Windows version to mitigate a serious security vulnerability in those systems. The vulnerability, CVE-2019-0708[2] (AKA “BlueKeep”) impacts multiple old[3] Windows versions (Windows XP, Vista, 7, Server 2003, 2008 and 2008 R2) by exploiting mishandled memory cleanup in Microsoft Remote Desktop Protocol (RDP), The post How a Zero-Trust Environment Can Help Defend Against BlueKeep appeared first on Security
More info:
https://blogs.vmware.com/security/2019/06/how-a-zero-trust-environment-can-help-defend-against-bluekeep.html