Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Veeam Extends Availability to IBM AIX and Oracle Solaris to Address Data Protection Requirements

Posted By - DynamicCISO,

Veeam Software, the Availability for the Always-On Enterprise innovator, last week announced that it has extended its portfolio of Availability solutions to support IBM AIX and Oracle Solaris operating environments.

- Read Full Article - 0 Comments

IBM, Packet Clearing House and Global Cyber Alliance Collaborate to Protect Businesses and Consumers from Internet Threats

Posted By - DynamicCISO,

IBM Security, Packet Clearing House and The Global Cyber Alliance (GCA) have launched a free service designed to give consumers and businesses added privacy and security protection as they access the Internet.

- Read Full Article - 0 Comments

CyberArk Automates and Simplifies Protection Against Privileged Account Exploitation

Posted By - DynamicCISO,

CyberArk Privileged Account Security Solution is the industry’s pioneering solution that can easily scale to protect against privileged account exploitation anywhere – on-premises, in hybrid cloud environments and across DevOps workflows.

- Read Full Article - 0 Comments

Almost 54 Mobile Malware Attacks per Business: Check Point Research

Posted By - DynamicCISO,

Check Point Software announced the results from the first ever study on the impact of mobile attacks in enterprise environments. Findings from the research are based on data collected from more than 850 organizations spread across four continents.

- Read Full Article - 0 Comments

Embed Cyber Security into Products and Services, Supply Chains and Partnerships: Rohit Kachroo, CISO Indiabulls

Posted By - Shipra Malhotra, Executive Editor

Rohit Kachroo, CISO, Indiabulls Group, in conversation with dynamicCISO, gives an insight into what is it that’s keeping the CISOs up at night and how they need to transform themselves to stay relevant in today’s dynamically evolving threat landscape.

- Read Full Article - 0 Comments

Only Half of Organizations Say Their Leaders Are Digitally Literate: ISACA Research

Posted By - DynamicCISO,

The Digital Transformation Barometer data delves into digital transformation and digital literacy within leadership, as well as emerging and disruptive technologies across the globe within several industries.

- Read Full Article - 0 Comments

Supply Chain Attacks to be More Prevalent in 2018: Kaspersky Report

Posted By - DynamicCISO,

The world will see more legitimate software being poisoned by groups targeting wider victim profiles and geographies, with the added advantage that such attacks are extremely hard to spot and mitigate.

- Read Full Article - 0 Comments

20 Percent of Consumers Would Knowingly Buy a Connected Device Vulnerable to Hacking: McAfee Survey

Posted By - DynamicCISO,

Yesterday McAfee announced its third annual Most Hackable Holiday Gifts list to help consumers identify potential security risks associated with popular gifts this holiday season. The category of laptops, tablets and smartphones leads the list.

- Read Full Article - 0 Comments

New Banking Trojan IcedID Discovered by IBM X-Force Research

Posted By - DynamicCISO,

After a year that has been very active in terms of banking malware, point-of-sale (POS) malware and rampant ransomware attacks, the X-Force team identified a new banking Trojan active in the wild dubbed IcedID.

- Read Full Article - 0 Comments

Script Kiddie Nightmare: IoT Attack Code Embedded with Backdoor: NewSky Researcher

Posted By - Ankit Anubhav, Principal Security Researcher

The IoT threat landscape is proving to be the fastest to evolve, with attacks shifting from basic password guessing, to using a variety of exploits as seen recently in the IoTroop/Reaper botnet. Enter the script kiddie — amateurish hackers that copy/paste code for quick results.

- Read Full Article - 0 Comments

Online Accounts Most Likely to be Compromised Through Phishing Attacks: Google Report

Posted By - DynamicCISO,

Between March 2016 and March 2017, Google researchers identified 12.4 million potential victims of phishing, roughly 788,000 potential victims of keylogger malware, and over 1.9 billion users whose accounts had been exposed due to data breaches.

- Read Full Article - 0 Comments

LifeLock Provides Identity Protection Tailored for Aging Parents

Posted By - DynamicCISO,

LifeLock, a Symantec company has launched an identity protection product, LifeLockSenior, tailored to help adult children protect their senior parents from identity theft. It allows both the senior member and their adult child the ability to receive potential identity threat alerts, from financial to criminal.

- Read Full Article - 0 Comments

Gemalto Launches First of its Kind On-Demand Security Platform to Protect Data Anytime, Anywhere

Posted By - DynamicCISO,

Gemalto, the world leader in digital security, has announced the launch of SafeNet Data Protection On Demand, a centralized cloud-based services platform for companies to protect data, meet compliance mandates and manage the security of all their sensitive information.

- Read Full Article - 0 Comments

Forcepoint’s Human-centric Security Helps Financial Services Firm Protect Critical Customer and Business Data in Hybrid Clouds

Posted By - DynamicCISO,

Forcepoint has announced the company’s human-centric, real-time security technology has been deployed by Simplicity Credit Union to protect the financial services firm’s 23,000 members, prevent catastrophic data breaches, centrally manage a hybrid cloud environment.

- Read Full Article - 0 Comments

IT Security Experts Uncertain on How to Combat Targeted Attacks: Kaspersky Research

Posted By - DynamicCISO,

Kaspersky Lab's new research report found that businesses realize a security breach will happen to them at some point (57 percent vs. 51 percent last year), but they remain unsure of the most effective strategy to combat threats like targeted attacks (42 percent).

- Read Full Article - 0 Comments

A Banking Trojan License Available for $3,000–$5,000: Recorded Future Research Reveals

Posted By - DynamicCISO,

Everything has its price on dark web, and almost anything can be sold or bought openly. Although sometimes it seems that to succeed in cybercrime, a person must be a Jack of all trades, in reality almost every criminal endeavor requires various tools and services provided by a network other members.

- Read Full Article - 0 Comments

Use of Cloud Services Is Increasing But Users Complain Lack of Visibility to Secure Data

Posted By - DynamicCISO,

The survey of security practitioners finds that they continue to have major concerns about sensitive data. More than 60% worry about unauthorized access by outsiders, followed by insecure, unmanaged devices accessing sensitive info from the cloud, followed by breach of sensitive data by cloud personnel.

- Read Full Article - 0 Comments

FireEye Introduces GoCrack - A Managed Password Cracking Tool

Posted By - DynamicCISO,

FireEye's Innovation and Custom Engineering (ICE) team released a tool called GoCrack that allows red teams to efficiently manage password cracking tasks across multiple GPU servers by providing an easy-to-use, web-based real-time UI to create, view, and manage tasks.

- Read Full Article - 0 Comments

Fortinet Advises Healthcare Industry in India to Prepare for Internet of Medical Things (IoMT) Cyber-Threats

Posted By - DynamicCISO,

Internet of Medical Things (IoMT) is a collection of medical devices and applications that connect to healthcare IT systems through online computer networks. These include medical devices equipped with Wi-Fi that allow machine-to-machine communication.

- Read Full Article - 0 Comments

Kaspersky Lab Launches its Global Transparency Initiative; Will Provide Source Code

Posted By - DynamicCISO,

The Global Transparency Initiative is part of Kaspersky Lab’s ongoing commitment to assuring the integrity and trustworthiness of its products in service of its corporate mission: protecting customers from cyberthreats

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All