Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

US Not Ready to Counter Cyber-attack: Say Authors of 9/11 Report

Posted By - DynamicCISO,

The United States has been partially unsuccessful to adapt to the new growing sophistication of the cyber security threats and dynamic attack patterns and is exposing itself to intensity apprehension strikes as harmful as Sep 11.

- Read Full Article - 0 Comments

Holistic Threat Prevention Across the Stack from L3 to L7 Must to Protect Enterprise: Sudarshan Sivaperumal, F5 Networks India

Posted By - Rahul Neel Mani, Editor

DynamicCISO, in its effort to reach out to the information security vendors, spoke to Sudarshan Sivaperumal, Field Systems Engineering, F5 Networks India and SAARC and probed him on the threat scenario, cyber attack landscape and the efforts F5 Networks is making to help Indian enterprises fight the cyber security threats.

- Read Full Article - 0 Comments

Focus on Internal Vulnerabilities, Comprehensive Security Education: Amit Singh, Country Manager India, Dell-SonicWALL

Posted By - Rahul Neel Mani, Editor

DynamicCISO, in its effort to reach out to the information security vendors, spoke to Amit Singh, Country Manager, Dell-SonicWALL India and probed him on the threat scenario, cyber attack landscape and the efforts Dell-SonicWALL is making to help Indian enterprises fight the cyber security threats.

- Read Full Article - 0 Comments

That Network Visibility Can Help Avoid the IT Blame Game: Emulex Study

Posted By - DynamicCISO,

Emulex Corporation, a leader in network connectivity, monitoring and management, announced the results of a study of 547 U.S. and European (NetOps and SecOps) professionals, which found that 45% of IT staffs monitor network and application performance manually, instead of implementing proven network monitoring tools.

- Read Full Article - 0 Comments

500,000-per-day SMS Spammer Gets Just £4,000 Fine

Posted By - DynamicCISO,

An Indian call-centre operator has been fined by a London court for breaching Data Protection laws, but despite his operation bombarding UK cell phones with spams, his punishment amounts to little more than a slap on the wrist.

- Read Full Article - 0 Comments

Apple and Google Told to Stop Misleading Consumers About 'Free' Apps

Posted By - DynamicCISO,

Following a large number of complaints in EU countries concerning in-app purchases in online games and in particular inadvertent purchases by children, national authorities joined forces with the European Commission to find solutions.

- Read Full Article - 0 Comments

Financial Services Sector is Most Prone to Cybercrime

Posted By - DynamicCISO,

58% of respondents perceive financial services sector as more likely to be prone to cybercrime. 51% perceive themselves to be an easy target for cyber-attacks due to the nature of their business. 68% of the respondents indicated that they assigned less than 20 per cent of their IT security budget for preventing cybercrime.

- Read Full Article - 0 Comments

BYOD Best Practices: 3 Steps to Manage Your BYOD Implementation

Posted By - Ian Evans, Vice President and Managing Director, EMEA; AirWatch by VMware

BYOD can be complicated, but with a few helpful tips, enterprises can implement and maintain an effective BYOD initiative. For companies that are gradually transitioning away from corporate-owned devices to a primarily BYOD model, providing employees with a selected set of device options may help ease the transition.

- Read Full Article - 0 Comments

Nearly 30% Security Professionals Would Completely Overhaul Their Current Enterprise Security System Given Resources & Opportunity

Posted By - DynamicCISO,

Websense's Global Survey with Ponemon Institute Survey, “Roadblocks, Refresh, & Raising the Human Security IQ,” of nearly 5,000 global IT security professionals reveals a knowledge and resource gap in the enterprise– leading to an increased level of vulnerability and risk of data security breaches.

- Read Full Article - 0 Comments

Juniper Networks Delivers the First Holistic DDoS Protection Solution in the Network

Posted By - DynamicCISO,

Juniper Networks has announced enhancements to its Juniper Networks DDoS Secure solution that help companies mitigate complex attacks by more effectively leveraging security intelligence throughout the network fabric, taking them one step closer to building a High-IQ Network.

- Read Full Article - 0 Comments

Government-Grade Malware Now in the Hands of Cybercriminals

Posted By - DynamicCISO,

In March 2014, the Sentinel Labs Research Lab detected a sophisticated piece of malware dubbed Gyges that is virtually invisible and capable of operating undetected for long periods of time. Gyges is an early example of how advanced techniques and code developed by governments for espionage are effectively being repurposed.

- Read Full Article - 0 Comments

Kaspersky Lab Adding 113,500 New Phishing Wildcards Every Month

Posted By - DynamicCISO,

Kaspersky Lab has found that the monthly average of phishing wildcards - a set of symbols describing a group of links detected by the system as phishing links - added to its anti-phishing database has increased 17.5 percent compared to last year.

- Read Full Article - 0 Comments

Trend Micro Announces Comprehensive Capabilities for Microsoft Office 365 Customers

Posted By - DynamicCISO,

As more organisations transition to the cloud for increased efficiencies and streamlined management of IT infrastructure, Trend Micro announced upcoming new and enhanced capabilities for Microsoft Office 365 customers.

- Read Full Article - 0 Comments

Reducing Incident Backlog: A Game Changer for Security Analysts

Posted By - Paul Nguyen, President, Global Security Solutions at CSG Invotas

The Cisco 2014 Annual Security Report points to a worldwide shortage of skilled security professionals. The daily working lives of security analysts are affected by this shortage, and one of the biggest obstacles they face is the backlog of security incidents generated as part of their incident response plans.

- Read Full Article - 0 Comments

Cyber Defense Maturity Report 2014

Posted By - DynamicCISO,

This independent research conducted by IDG Connect, on behalf of FourScout, offers key insights into the nature of security issues impacting organizations; the perceived maturity of process, controls and tools applied to preempt and contain exposures etc.

- Read Full Article - 0 Comments

Unisys Survey Reveals Nearly 70 Percent of Critical Infrastructure Providers Have Been Breached in the Past Year

Posted By - DynamicCISO,

Nearly 70 percent of companies surveyed that are responsible for the world’s power, water and other critical functions have reported at least one security breach that led to the loss of confidential information or disruption of operations in the past 12 months, reports a Survey by Ponemon & Unisys.

- Read Full Article - 0 Comments

AVAST Demonstrates Risk of Selling Used Smartphones – Recovers 40,000 Personal Photos and Emails from Phones Bought Online

Posted By - DynamicCISO,

AVAST Software, makers of the free anti-virus software, easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, AVAST was able to recover more than 40,000 personal photos, emails, text messages, and – in some cases – the identities of the sellers.

- Read Full Article - 0 Comments

Vitalwerks and Microsoft Reach Settlement

Posted By - DynamicCISO,

On Monday, June 30 2014, Microsoft filed a civil suit in a Nevada federal court to disrupt Bladabindi-Jenxcus, a pervasive family of malware that put millions of customers at risk.. Yesterday, both Microsoft Corporation and Vitalwerks Internet Solutions, LLC announce they have reached a settlement.

- Read Full Article - 0 Comments

Kaspersky Lab on Cybercriminals Who Take Advantage of Cloud Services

Posted By - DynamicCISO,

By following these recommendations, users inadvertently create different kinds of security gaps which can be easily exploited by cybercriminals – particularly in the case of targeted attacks. Kaspersky Lab experts decided to have a closer look at the risk of a corporate network being infected via cloud services.

- Read Full Article - 0 Comments

Cybercrime Bust Frees 4.7 Million Infected PCs: Microsoft

Posted By - DynamicCISO,

n news flashes that are still coming in, Microsoft has claimed to have freed nearly 4.7 million infected PCs from the clutches of the cyber crooks. According to the company's claim, this is the most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All