Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Forcepoint Acquires RedOwl, Extends Global Human-Centric Security Leadership

Posted By - DynamicCISO,

Forcepoint has announced the acquisition of RedOwl, the leader in security analytics focused on helping customers understand and manage human risk. This latest milestone in Forcepoint’s strategy arms customers with cyber security systems designed for the reality of today’s threats.

- Read Full Article - 0 Comments

Juniper Networks Introduces Contrail Security to Help Enterprises Protect Applications in Any Cloud

Posted By - DynamicCISO,

Juniper Networks launched Juniper Contrail Security, a new security and micro segmentation solution specifically designed to allow enterprises and Software-as-a-Service (SaaS) cloud providers to protect applications running in multiple cloud environments.

- Read Full Article - 0 Comments

Information Security Spending In India Will Grow 12% to Reach $1.5 Billion in 2017: Gartner

Posted By - DynamicCISO,

Spending on information security products and services in India will reach $1.5 billion in 2017 in constant currency terms, an increase of 12 percent over 2016, with spending expected to grow to $ 1.7 billion in 2018, according to the latest forecast from Gartner.

- Read Full Article - 0 Comments

Kaspersky Lab Announces IoT Device Scanner Beta to Aid Smart Home Defense

Posted By - DynamicCISO,

Kaspersky Lab has released a beta version of its solution for the "smart" home and the Internet of Things – Kaspersky IoT Scanner. This free application for the Android platform scans a home Wi-Fi network, informing the user about the devices connected to it and their level of security.

- Read Full Article - 0 Comments

User Credentials and Privileged Accounts Named Top Data Targets: SANS

Posted By - DynamicCISO,

User credentials and privileged accounts are the most common data types involved in significant breaches, according to results of a new survey by the SANS Institute. Access information is most sought after because it grants the attackers the same privilege as their victims.

- Read Full Article - 0 Comments

TCO the Biggest Cybersecurity Operations Challenge: ESG Report

Posted By - DynamicCISO,

A recent ESG research survey of 412 cyber security and IT professionals (Cybersecurity Analytics and Operations in Transition) identified some of the biggest security analytics and operations challenges.

- Read Full Article - 0 Comments

New ISACA Guidance Helps Health Care Organizations Overcome Six Governance Challenges

Posted By - DynamicCISO,

Global technology association ISACA has issued complimentary guidance to help healthcare organizations more effectively handle governance of enterprise IT (GEIT). Specifically, GEIT for Health Care outlines the top six governance challenges healthcare organizations face.

- Read Full Article - 0 Comments

Poor Security Hygiene and Risky Applications Enable Destructive Cyberattacks to Spread Infection

Posted By - DynamicCISO,

Fortinet has announced the findings of its latest Global Threat Landscape Report. The research reveals that poor cyber security hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed.

- Read Full Article - 0 Comments

Global InfoSec Spend Expected to Grow to $93B Next Year: Gartner

Posted By - DynamicCISO,

Worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 billion in 2018, according to the latest forecast from Gartner, Inc.

- Read Full Article - 0 Comments

IBM Launches New Storage Software to Simplify Data Protection

Posted By - DynamicCISO,

IBM yesterday announced a new data protection software that is easy to set up, easy to manage and helps simplify data recovery. IBM Spectrum Protect™Plus can be set up quickly making data protection available in as little as one hour.

- Read Full Article - 0 Comments

U.S. Cyber Command Elevated to Unified Combatant Command

Posted By - DynamicCISO,

At the direction of the president, the Defense Department has initiated the process to elevate U.S. Cyber Command to a unified combatant command. The elevation of the command demonstrates the increased U.S. resolve against cyberspace threats and will help reassure allies and partners and deter adversaries.

- Read Full Article - 0 Comments

Microsoft Announces the Coco Framework to Improve Performance, Confidentiality and Governance Characteristics of Enterprise Blockchain Networks

Posted By - DynamicCISO,

Microsoft has recently announced the Coco Framework, a first-of-its-kind innovation that will advance enterprise adoption of blockchain technology. Current blockchain protocol technology requires complicated development techniques to meet the operational and security needs of enterprises.

- Read Full Article - 0 Comments

New Version of Faketoken Android Trojan Hunts for Taxi and Ride-Sharing App Users

Posted By - DynamicCISO,

The Trojan steals all incoming SMS messages by redirecting them to its command and control servers, allowing criminals access to one-time verification passwords sent by a bank, or other messages sent by taxi and ride-sharing services.

- Read Full Article - 0 Comments

Check Point Launches New Research Online Platform and Releases Mid-Year Cyber Attack Trends Report

Posted By - DynamicCISO,

Check Point Research is a platform to inform the threat intelligence community on original Check Point research, top trends in the cyber security space, and details on the current threat landscape.

- Read Full Article - 0 Comments

Trend Micro Reveals Top Ten Regions Affected by IoT Security Threats

Posted By - DynamicCISO,

Trend Micro on Tuesday released the “Trend Micro 2017 1H Smart Home Network Security Summary,” revealing the top 10 regions most affected by cyber attacks on a home router and identifying key factors for an in-home cyber security threat.

- Read Full Article - 0 Comments

Information Security Spending to Reach $86.4 Billion in 2017: Gartner

Posted By - DynamicCISO,

Worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 billion in 2018, according to the latest forecast from Gartner, Inc.

- Read Full Article - 0 Comments

Forcepoint Simplifies Cybersecurity Through Cloud-Based Behaviour Analytics

Posted By - DynamicCISO,

New capabilities now available across Forcepoint CASB, Forcepoint Web Security and Forcepoint Email Security ensure customers around the world can safely embrace, and continue to grow, their business in the cloud.

- Read Full Article - 0 Comments

Check Point Researchers Uncover International Cyber Attack Campaign

Posted By - DynamicCISO,

Check Point yesterday revealed the identity of the criminal behind a series of what appeared to be state-sponsored cyberattacks targeting over 4,000 companies in the energy, mining and infrastructure sectors.

- Read Full Article - 0 Comments

On-Premises Workloads Experience 51% Higher Rate of Security Incidents than Apps Running on Public Cloud

Posted By - DynamicCISO,

Web application attacks accounted for 73 percent of all the incidents flagged in the 18-month evaluation period. Web application attacks affected 85 percent of all Alert Logic customers, with injection-style attacks such as SQL injection leading the pack.

- Read Full Article - 0 Comments

DigiCert to Acquire Symantec’s Website Security and Related PKI Solutions

Posted By - DynamicCISO,

Symantec and DigiCert, a leading provider of scalable identity and encryption solutions for the enterprise, last week announced an agreement under, which DigiCert will acquire Symantec’s Website Security and related PKI solutions.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All