Monday, September 23, 2019
isBuzz

The Evolution Of Cybersecurity

Demands and expertise of the security industry are driven by technological advancement on both sides of the attack/defence fence Increased computer power, artificial intelligence, and tools on the Dark Web are equipping cyber attackers with the resources to launch more...
isBuzz

Improving Safety At The Rugby World Cup, On And Off The Pitch

This year’s rugby world cup in Japan will be the biggest and most tech-enabled incarnation yet. It doesn’t have a choice. The modern-day sporting spectacle is invariably a hyper-connected production of dizzying permutations and potential. 1,8 million tickets will change...
isBuzz

How To Block DDoS Attacks Using Automation

DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of successfully mitigating attacks. In this article, we’ll explore the five ways, listed below, that automation can significantly improve response times during a...
isBuzz

Security Needs Versus Worker Accessibility: The Balancing Act In Evolving Technology

Over the last decade, there has been a significant shift in how we work. The explosion of cloud and “as-a-service” technologies has made it easy for anyone within an organisation to both purchase and use preferred applications, often without...
isBuzz

3 Approaches School Districts Must Take To Protect Against Increasing Cyber Attacks

Look at recent data breaches and you’ll see most attention points to commercial businesses, with Imperva being the most recent firm falling victim to an attack that exposed email addresses, scrambled passwords, API keys and SSL certificates. Data breaches and...
isBuzz

The Good, The Bad And The Ugly Of Digital Transformation

Corporate networks are being restructured in order to enable digital transformation so that organizations can remain competitive in the market. Modernising the network means that a shift is taking place across businesses, with technological innovations such as public, private and hybrid...
isBuzz

3 Strategies For Protecting Your Network Against DNS Hijacking

More than any other digital communications infrastructure, cybercriminals are increasingly targeting the domain name system. The DNS, often referred to as the phone directory of the internet, is vulnerable to hijacking, a serious and growing threat. A variation known as...
isBuzz

Are Regulations Defining The Future Of Biometrics?

Data protection and privacy have become buzzwords in the European digital ecosystem in the era of GDPR, introduced in May last year. The Swedish data protection authorities (DPA) recently levied the first fine of approximately $ 20,000 to a...
isBuzz

These Phishing Techniques Bypass Two-Factor Authentication

Security professionals are quick to laud Two-Factor Authentication (or 2FA) and think their organization is protected from common schemes like credential stealing or login theft just by having it in place. But 2FA can be intercepted by hackers in...
isBuzz

Going Back To Basics: Data Security After The Capital One Breach

When the news broke that a Capital One data breach had affected approximately 100 million customers in the U.S. and another 6 million in Canada, there was widespread panic among the company’s users and much confusion regarding data storage...
isBuzz

Alexa: How Secure Is My Smart Home?

Baby monitors, CCTV tools and smart home devices like Amazon Alexa and Google Home are all handy additions to today’s modern home. A quarter of Britons now own one or more smart home devices, and by 2023 every home in the UK is...
isBuzz

Identity And Security: A Perfect Match

It is no secret that there has been a steep rise in the number of cybercriminals looking to target businesses to obtain personal data and intellectual property. Last year, the ICO issued a record breaking total of monetary penalties...
isBuzz

What To Do When Ransomware Strikes

An employee walks over to your office, fingers fidgeting and brow sweating. They tell you that there’s something you have to see. Concerned, you quickly rush to their desk. On their computer screen is a single message that reads: “We...
isBuzz

The Most Common Hack Is Also The Most Successful. Here’s How To Fight It.

Despite what movies might show, most hacks don’t involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren’t hacks at all: They’re social engineering. Simply put, social engineering...
isBuzz

How To Overcome 3 Key Challenges Of Shared Responsibility In The Cloud

The cloud is changing the nature of business with a powerful approach to streamlining operations and staying current with the latest technology. But as the saying goes, with great power comes great responsibility. In this case, that responsibility breaks...
SC Magazine

Steve Grobman – McAfee

Steve GrobmanSenior Vice President & Chief Technology OfficerMcAfee Why Nominated:  With over 20 years of experience, Grobman has held numerous technical and cybersecurity leadership positions over the years. In these various roles – from his time as an...
SC Magazine

Greg Lesnewich – Recorded Future

Greg LesnewichThreat Intelligence AnalystRecorded Future Why Nominated: With a focus on state-sponsored espionage campaigns and Middle Eastern- borne cyber threats, as a Threat Intelligence Analyst at Recorded Future, Greg Lesnewich provides detailed threat actor and malware profiles to some of the world’s...
SC Magazine

Ophir HarpazSecurity ResearcherGuardicore Why nominated: After spending several years working on email security products, Ophir Harpaz became interested in understanding how malware worked. She then began working as a cybercrime researcher specializing in financial malware and hunted banking trojans and analyzed their...
SC Magazine

Amina Bashir – Flashpoint

Amina BashirAnalyst II, Hunt TeamFlashpoint Why Nominated: Flashpoint analystAmina Bashir is her company’s go-to subject-matter expert on the threat landscape of the Indian subcontinent. In her role, she has authored key research on the malicious use of chatbots, as well as vulnerabilities...
SC Magazine

Ning Wang – Offensive Security

Ning WangCEO Offensive Security Why Nominated: Ning Wang is a rising star has worked to break the boundaries in the security industry, so that people can see that anyone is capable of starting a career in cybersecurity and advancing it –...