Tuesday, August 3, 2021
isBuzz

Build These Five Habits To Reduce The Risk Of Ransomware

Following a spate of high-profile attacks, it is all too easy to consider ransomware as a threat more for large, well-known, businesses. Research, however, suggest this is far from the… The ISBuzz Post: This Post Build These Five Habits To...
isBuzz

The Cyber Story Of The Pandemic: Our Shared Security Debt

Organisations, industry observers and vendors have all talked a lot about the pace of change in recent months. We have seen how services provision has been transformed, how rapidly new… The ISBuzz Post: This Post The Cyber Story Of The...
isBuzz

How Bank CISOs Can Respond To A Digital Hostage Scenario

Trust has always been the cornerstone of the banking industry. Without customer confidence that their assets are secure, banks cannot function. A reputation for having the strongest vaults with the… The ISBuzz Post: This Post How Bank CISOs Can Respond...
isBuzz

Ensuring A Safer Web Browsing Experience: Using Ad Blockers To Fight Malvertising

In recent months, an alarming number of cyber-attacks have taken place across a number of industries. Just this week, US based company Colonial Pipeline were victims of an attack that… The ISBuzz Post: This Post Ensuring A Safer Web Browsing...
isBuzz

The Changing Trends In Cyber Security

According to figures released in 2020 by the Department for Digital, Culture, Media and Sport, the UK’s cyber security industry is worth £8.3bn. However, the picture isn’t as cohesive as… The ISBuzz Post: This Post The Changing Trends In Cyber...
isBuzz

So Just What Is Cloud-based Access Management?

The increasingly distributed nature of corporate IT networks poses problems for legacy on-premises access management and authentication. With users accessing cloud-based applications and other corporate resources from multiple device types… The ISBuzz Post: This Post So Just What Is Cloud-based...
isBuzz

Biometric Authentication: The Good, The Bad And The Ugly

Today, our physical characteristics are becoming the key to digital authentication, gradually replacing PINs and passwords. With many services becoming digital and automated, our unique biometric data is becoming a vital element in unlocking them. Biometric authentication is used to access mobile… The ISBuzz Post: This Post Biometric Authentication: The Good, The...
isBuzz

Critical Infrastructure Cybersecurity: All Hands On Deck

Since last year, the scale and severity of ransomware attacks have escalated to an alarming level. On top of raising the amount of ransom, bad actors have also shifted the… The ISBuzz Post: This Post Critical Infrastructure Cybersecurity: All Hands...
isBuzz

SASE And CASB: Reclaiming The Perimeter

For many years, information security has been built on the concept of perimeter-based network security that assumes all internal entities within a network boundary are trusted and external entities are… The ISBuzz Post: This Post SASE And CASB: Reclaiming The...
isBuzz

Can Identity Verification Build Trust In The UK’s Sharing Economy?

While the UK begins to cautiously return to some semblance of normality, seeing diners in restaurants and people enjoying weekends away reminds us of some of our pre-pandemic pastimes. However,… The ISBuzz Post: This Post Can Identity Verification Build Trust...
isBuzz

Technology Blind Spots: Is Lack Of Visibility Leaving Your Business Exposed?

One of the most concerning issues for IT leaders and organisations in 2021 is the impact of technology blind spots. Snow Software’s 2021 IT Priorities Report found that an awareness gap still… The ISBuzz Post: This Post Technology Blind Spots: Is Lack...
isBuzz

The Central Bank Digital Currency Is Now A Reality: Payment Card Security Needs To Catch Up

The idea of a Central Bank Digital Currency (CBDC) – a blockchain-based digital currency issued by a central bank – is now a reality, with the launch of the Sand… The ISBuzz Post: This Post The Central Bank Digital Currency...
isBuzz

The Top Trends Shaping The Future Of Access Management In 2021

One thing that is certain in security: at any given time, there is always someone accessing their sensitive assets without crossing the traditional network boundary. It’s taken them time –… The ISBuzz Post: This Post The Top Trends Shaping The...
isBuzz

Viewing Enterprise Cryptography In A New Light: Traversing A Fragmented Environment

Cryptography has taken a tumultuous journey over the past 20 years. As the digital world has evolved, its role in protecting the modern enterprise has become more crucial than ever.… The ISBuzz Post: This Post Viewing Enterprise Cryptography In A...
isBuzz

Cyber Security: Data ‘Re’-Assurance

How do organisations know their data is secure? And how can companies ensure that a network breach won’t result in a loss of sensitive data? The consequences of a data… The ISBuzz Post: This Post Cyber Security: Data ‘Re’-Assurance appeared...
The Register

Do you have a grip on the lifecycle security of your AWS-deployed applications?

Learn how to manage the risks of cloud native environments with Aqua and AWS Promo  There’s no doubt that adopting DevOps methodologies and CI/CD pipelines, and extending cloud native technologies like containerization can massively accelerate your application development and...
TechRepublic

Beef up security in Firefox with Fission

Jack Wallen shows you how to enable Fission. Firefox developers understand web browser security is at a premium, so they've rolled out a site isolation feature.
TechRepublic

Cybersecurity professionals: Positive reinforcement works wonders with users

The blame game is not working; experts suggest using positive reinforcement to improve employee attitude and performance.
SecurityWeek

Google Patches High-Risk Android Security Flaws

Google this week pushed out a security-themed Android update with fixes for more than 30 security flaws that expose mobile users to a range of malicious hacker attacks. The latest Android update provides documentation on 33 security bugs, some serious...

Awful transaction and timing: AT&T finally ditches DirecTV

Enlarge (credit: Getty Images | Ronald Martinez) AT&T has completed its spinoff of DirecTV after six years of mismanagement in which nearly 10 million customers ditched the company's pay-TV services. AT&T bought DirecTV for $49 billion ($67 billion including...