Wednesday, October 27, 2021
isBuzz

Build These Five Habits To Reduce The Risk Of Ransomware

Following a spate of high-profile attacks, it is all too easy to consider ransomware as a threat more for large, well-known, businesses. Research, however, suggest this is far from the… The ISBuzz Post: This Post Build These Five Habits To...
isBuzz

The Cyber Story Of The Pandemic: Our Shared Security Debt

Organisations, industry observers and vendors have all talked a lot about the pace of change in recent months. We have seen how services provision has been transformed, how rapidly new… The ISBuzz Post: This Post The Cyber Story Of The...
isBuzz

How Bank CISOs Can Respond To A Digital Hostage Scenario

Trust has always been the cornerstone of the banking industry. Without customer confidence that their assets are secure, banks cannot function. A reputation for having the strongest vaults with the… The ISBuzz Post: This Post How Bank CISOs Can Respond...
isBuzz

Ensuring A Safer Web Browsing Experience: Using Ad Blockers To Fight Malvertising

In recent months, an alarming number of cyber-attacks have taken place across a number of industries. Just this week, US based company Colonial Pipeline were victims of an attack that… The ISBuzz Post: This Post Ensuring A Safer Web Browsing...
isBuzz

The Changing Trends In Cyber Security

According to figures released in 2020 by the Department for Digital, Culture, Media and Sport, the UK’s cyber security industry is worth £8.3bn. However, the picture isn’t as cohesive as… The ISBuzz Post: This Post The Changing Trends In Cyber...
isBuzz

So Just What Is Cloud-based Access Management?

The increasingly distributed nature of corporate IT networks poses problems for legacy on-premises access management and authentication. With users accessing cloud-based applications and other corporate resources from multiple device types… The ISBuzz Post: This Post So Just What Is Cloud-based...
isBuzz

Biometric Authentication: The Good, The Bad And The Ugly

Today, our physical characteristics are becoming the key to digital authentication, gradually replacing PINs and passwords. With many services becoming digital and automated, our unique biometric data is becoming a vital element in unlocking them. Biometric authentication is used to access mobile… The ISBuzz Post: This Post Biometric Authentication: The Good, The...
isBuzz

Critical Infrastructure Cybersecurity: All Hands On Deck

Since last year, the scale and severity of ransomware attacks have escalated to an alarming level. On top of raising the amount of ransom, bad actors have also shifted the… The ISBuzz Post: This Post Critical Infrastructure Cybersecurity: All Hands...
isBuzz

SASE And CASB: Reclaiming The Perimeter

For many years, information security has been built on the concept of perimeter-based network security that assumes all internal entities within a network boundary are trusted and external entities are… The ISBuzz Post: This Post SASE And CASB: Reclaiming The...
isBuzz

Can Identity Verification Build Trust In The UK’s Sharing Economy?

While the UK begins to cautiously return to some semblance of normality, seeing diners in restaurants and people enjoying weekends away reminds us of some of our pre-pandemic pastimes. However,… The ISBuzz Post: This Post Can Identity Verification Build Trust...
isBuzz

Technology Blind Spots: Is Lack Of Visibility Leaving Your Business Exposed?

One of the most concerning issues for IT leaders and organisations in 2021 is the impact of technology blind spots. Snow Software’s 2021 IT Priorities Report found that an awareness gap still… The ISBuzz Post: This Post Technology Blind Spots: Is Lack...
isBuzz

The Central Bank Digital Currency Is Now A Reality: Payment Card Security Needs To Catch Up

The idea of a Central Bank Digital Currency (CBDC) – a blockchain-based digital currency issued by a central bank – is now a reality, with the launch of the Sand… The ISBuzz Post: This Post The Central Bank Digital Currency...
isBuzz

The Top Trends Shaping The Future Of Access Management In 2021

One thing that is certain in security: at any given time, there is always someone accessing their sensitive assets without crossing the traditional network boundary. It’s taken them time –… The ISBuzz Post: This Post The Top Trends Shaping The...
isBuzz

Viewing Enterprise Cryptography In A New Light: Traversing A Fragmented Environment

Cryptography has taken a tumultuous journey over the past 20 years. As the digital world has evolved, its role in protecting the modern enterprise has become more crucial than ever.… The ISBuzz Post: This Post Viewing Enterprise Cryptography In A...
isBuzz

Cyber Security: Data ‘Re’-Assurance

How do organisations know their data is secure? And how can companies ensure that a network breach won’t result in a loss of sensitive data? The consequences of a data… The ISBuzz Post: This Post Cyber Security: Data ‘Re’-Assurance appeared...
The Register

China Telecom booted out of USA as Feds worry it could disrupt or spy on local networks

FCC urges more action against Huawei and DJI, too The US Federal Communications Commission (FCC) has terminated China Telecom's authority to provide communications services in the USA.…
SecurityWeek

150 People Arrested in US-Europe Darknet Drug Probe

Law enforcement officials in the U.S. and Europe have arrested 150 people and seized more than $31 million in an international drug trafficking investigation stemming from sales on the darknet, the Justice Department said Tuesday. read more

Free Tool Helps Security Teams Measure Their API Attack Surface

Data Theorem's free API Attack Surface Calculator helps security teams understand potential API exposures.

SquirrelWaffle Loader Malspams, Packing Qakbot, Cobalt Strike

Say hello to what could be the next big spam player: SquirrelWaffle, which is spreading with increasing frequency via spam campaigns and infecting systems with a new malware loader.

North Korea's Lazarus Group Turns to Supply Chain Attacks

State-backed group is among a growing number of threat actors looking at supply chain companies as an entry point into enterprise networks.