Thursday, July 19, 2018

Why Defending Insider Threats Takes More than Just Technology

Insider threats can pose a serious risk to security. Yet out of approximately 250 professionals surveyed by Varonis1, as many as 24% have no breach detection capabilities and 40% are not able to detect when files containing sensitive data...

Programmability Delivers Greater Agility

How automation and orchestration optimise operations Programmability is critical in modern data centres and the cloud to support automation, orchestration, and standardisation. Security is the vital component that ensures applications and data are robustly protected to deliver value to business...

NHS At 70 And The Role Of Cybersecurity

The UK’s National Health Service is celebrating its 70th anniversary this year. To coincide with this, the UK government has made a big financial commitment to the service’s future. The NHS annual budget of £114 billion will rise by...

Securing Manufacturing In The Age Of Industry 4.0

A recent survey, carried out by industry body EEF, revealed that almost half of UK manufacturers have been victims of a cyber-attack. Indeed, of the 48 percent that reported being subject to a cyber-security incident, half had suffered some degree...

Bringing Visibility To The Issue Of Web Data Bloat

Francesco Giarletta, CEO of Avanite, examines the potential security issues that simple web browsing data can cause and how web data bloat can be reduced Whenever a user visits a website, data is created, downloaded, and stored. Some of this...

Cyber-Security Professionals Must Rethink Their Strategy Of Beating Cyber-Attacks

A recent survey by the Bank of England revealed that cyber-attacks were the joint second most cited risk to the stability of the UK financial system. The proportion of respondents that named cyber-attacks increased for the third consecutive survey...

How To Use The IIoT To Immunize Against Critical Infrastructure Hacks

Recent news of Russia hacking U.S. critical infrastructure operators, including energy, nuclear, water, aviation and critical manufacturing facilities, means scary times for facility owners and operators. Industrial Internet of Things’ (IIoT) network connections for energy and utilities increased 41...

The Most Common Hack Is Also the Most Successful. Here’s How to Fight It.

Despite what movies might show, most hacks don’t involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren’t hacks at all: They’re social engineering. Simply put, social engineering...

Government Bodies Are At Risk Online

It’s a statement that’s true for a lot of industries, but it’s different for the government. These aren’t traditional ransomware attacks, or email phishing scams carried out by people at home trying to make easy money. Government hacks are calculated....

IBM Research – Full Cost Of “Mega Breaches,” As High As $350 Million

Today IBM released IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses. Ilia Kolochenko, CEO and founder of web security company High-Tech Bridge commented below as part of security experts comments. Ilia Kolochenko, CEO and founder at High-Tech Bridge: The main costs when...

Facebook To Be Fined £500,000 By The ICO Over Cambridge Analytica

It has been reported that the Information Commissioner’s Office intends to fine Facebook £500,000 for failing to safeguard users’ data, and not telling tens of millions of people how Cambridge Analytica harvested their information for use in political campaigns. IT security experts...

File-Based Malware: Considering A Different And Specific Security Approach

The cybersecurity solutions landscape has evolved from simple but effective signature-based scanning solutions to sandboxing—the isolating layer of security between your system and malware—and, most recently, to sophisticated detection methods. The new generation is based on behavioral detection or...

Why Advanced Application Security Is A Match For Today’s Sophisticated Cyber-Attacks

For the first time in 28 years, the England team are through to the semi-finals of the World Cup. As all eyes turn to the pitch for the next match, hackers will be booting up the botnets ready to...

Gartner Identifies The Top Six Security And Risk Management Trends

Analysts Will Explore the Trends Security Leaders Face During the Gartner Security & Risk Management Summit, 10-11 September 2018, London, UK Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner, Inc. said that security leaders should...

Smart, Secure And Seamless Authentication: Why We’ll Never Have To Enter A Password Again

Since the early days of computing, passwords have long been used as a method of identity authentication. However, there is one fundamental flaw in this method of identity authentication; as times have changed, passwords haven’t and they are now...

Why the Best Defense Is a Good Offensive Security Strategy

When many people think about offensive security, they picture a mysterious figure wearing a hoodie, sitting behind a black-and-green terminal, diligently typing away as he probes enterprise networks. But the cybersecurity world has evolved well beyond this Hollywood hacker...

Google hit with $5.1b fine in EU’s Android antitrust case

This could mean the end of free Android. In the meantime, Google plans to appeal.

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency.

IDG Contributor Network: Hack like a CISO

I have written several times over the last couple of years about how the role of today’s CISOs have changed and are now more tuned to support business activities and the management of enterprise risk. Serving an organization as...

Cisco patches critical vulnerabilities in Policy Suite

One of the worst security flaws permits attackers to act as root and execute arbitrary code.