Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Viator Data Compromise News Breaks Out: many Affect 1.4 Million Users

Posted By - DynamicCISO,

Viator, through a notice issued on September 19, is sensitising its customers about a data compromise that could potentially affect payment card data used to make bookings through Viator's websites and mobile offerings.

- Read Full Article - 0 Comments

Microsoft Winds Up Trustworthy Computing Group in its Current Form

Posted By - DynamicCISO,

As part of the layoffs, reorg, and realignment efforts, Microsoft has decided to close down its over 12 years old initiative taken by none other than Bill Gates himself - The Trustworthy Computing Group and will be aligned with its Cloud and Enterprise Division, and its Legal & Corporate Affairs group.

- Read Full Article - 0 Comments

Microsoft Online Services Bug Bounty Program launches with Office 365

Posted By - DynamicCISO,

Travis Rhodes, Senior Security Lead for Microsoft Office 365 yesterday in his blog worte about the new Bug Bounty Program. The text of his blog which was originally published at Office Blogs, is reproduced below with all quotes and statements attributed to Travis.

- Read Full Article - 0 Comments

McAfee Delivers New Security Suites to Protect Consumers’ Devices and Digital Lives

Posted By - DynamicCISO,

McAfee, part of Intel Security, has announced the availability of 2015 consumer security suites, with improved protection to safeguard consumers’ ever-evolving digital lives. The new product line includes McAfee AntiVirus Plus 2015, McAfee Internet Security 2015, McAfee Total Protection 2015, and the McAfee LiveSafe 2015.

- Read Full Article - 0 Comments

Cloud Security Alliance Survey Finds IT Professionals Underestimating How Many Cloud Apps Exist in the Business Environment

Posted By - DynamicCISO,

The Cloud Security Alliance (CSA) recently released the results of a new survey that found a significant difference between the number of cloud-based applications IT and security professionals believe to be running in their environments, and the number reported by cloud application vendors.

- Read Full Article - 0 Comments

Boeing to Open First Cyber Analytics Center Outside the US in Singapore

Posted By - DynamicCISO,

Boeing will open its first Cyber Analytics Center outside the U.S. in Singapore, to bring advanced cybersecurity capabilities and services to customers in the Asia-Pacific region. The center will help train and equip cybersecurity pros, perform advanced analytics and serve as its regional cybersecurity center of excellence.

- Read Full Article - 0 Comments

FireEye and Mandiant Unite to Deliver Industry's First Global Security as a Service Solution With FireEye as a Service

Posted By - DynamicCISO,

FireEye has announced two new solutions designed to equip organizations to scale their defense strategies. The new FireEye as a Service offering is an on-demand security management offering that allows organizations to apply FireEye’s technology, intelligence and expertise to find and stop cyber attacks.

- Read Full Article - 0 Comments

New National Authority for Operative Cyber Defense

Posted By - DynamicCISO,

Prime Minister Benjamin Netanyahu has decided to establish a national operative cyber defense authority, The new authority will receive the necessary responsibility and authority to defend the civilian sphere from cyber threats and will constitute an operative agency that will act alongside the Israel National Cyber Bureau.

- Read Full Article - 0 Comments

Simply Secure: A New Initiative by Info Security Firms and Researchers

Posted By - DynamicCISO,

Internet giant Google, personal cloud storage provider Dropbox, the Open Technology Fund and many other renowned researcher have joined forces to create affordable, easy to use security technologies for safer future. This will be known as "Simply Secure"

- Read Full Article - 0 Comments

The Home Depot Completes Malware Elimination and Enhanced Encryption of Payment Data in All U.S. Stores

Posted By - DynamicCISO,

The Home Depot has confirmed that credit and debit cards used at stores across the United States and Canada have been compromised and the company's estimate suggests that a total of 56 million customer payment cards had been exposed between April and September 2014.

- Read Full Article - 0 Comments

IT Professionals Report a Lack of High Confidence in Preventing Cyber Attacks

Posted By - DynamicCISO,

In an era when cyber security threats are more common than ever, organisations continue to struggle to manage data securely, prepare for potential crisis scenarios, and defend against hacking and other cyber threats, according to findings from the 2014 IT Security and Privacy Survey

- Read Full Article - 0 Comments

Global Cross Industry Leaders Convene on Securing the Future of Payments

Posted By - DynamicCISO,

With the backdrop of a recent cyber threats affecting many U.S. businesses, the PCI Security Standards Council, an open global forum for the development of payment card security standards, convened cross-industry leaders in Orlando last week to collaborate on securing the future of payments.

- Read Full Article - 0 Comments

72% of Businesses Don’t Trust Cloud Vendors to Obey Data Protection Laws and Regulations

Posted By - DynamicCISO,

There is widespread mistrust of cloud providers across Europe with seven in 10 businesses accusing them of failing to comply with laws and regulations on data protection and privacy. The finding was revealed in a new study entitled “Data Breach: The Cloud Multiplier Effect in European Countries.

- Read Full Article - 0 Comments

Dispelling the Myths of Virtualisation Security

Posted By - David Emm, Principal Security Researcher, Global Research & Analysis Team, Kaspersky

The sheer capacity of virtual machines means they can handle more critical data and perform more tasks than ever before. An increasingly core part of mission-critical IT infra, virtualisation is growing as a platform for managing customer data, financial transactions, and the applications that businesses use every minute.

- Read Full Article - 0 Comments

System Failures Cause Most Large Outages of Electronic Communications Services

Posted By - DynamicCISO,

The Annual Incidents report 2013 provides an aggregated analysis of the security incidents in 2013which caused severe outages. Most incidents reported to regulators and ENISA involved mobile internet and mobile connections. The most frequent causes are system failures affecting mainly base stations and switches.

- Read Full Article - 0 Comments

IoT Security Must be Fixed for the Long Term: Beecham Report

Posted By - DynamicCISO,

The potential damage to people, possessions, businesses and national critical infrastructure from a successful attack on cyber-physical systems through the rapidly emerging Internet of Things (IoT), cannot be underestimated, according to a new study announced today by Beecham Research.

- Read Full Article - 0 Comments

Over 20% of Enterprises Will Have Digital Security Services Devoted to Protecting Business Initiatives Using the IoT by End of 2017

Posted By - DynamicCISO,

By end of 2017, over 20% of enterprises will have digital security services for protecting business initiatives using devices and services in the Internet of Things, according to Gartner, Inc. Business cases using Internet of Things (IoT) devices already exist and their role in business and industry will force enterprises to secure them.

- Read Full Article - 0 Comments

More than 75 Percent of Mobile Applications will Fail Basic Security Tests Through 2015: Gartner

Posted By - DynamicCISO,

Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner, Inc. Enterprise employees download from app stores and use mobile applications that can access enterprise assets or perform business functions, and these applications have little or no security assurances.

- Read Full Article - 0 Comments

Hacking Canon Pixma Printers - Doomed Encryption

Posted By - DynamicCISO,

This blog post is another in the series demonstrating current insecurities in devices categorised as the ‘Internet of Things’. This instalment will reveal how the firmware on Canon Pixma printers (used in the home and by SMEs) can be modified from the Internet to run custom code.

- Read Full Article - 0 Comments

VDI for Information Security

Posted By - Yonni Shelmerdine, Mobile Security Trends Analyst, Lacoon

With enterprises around the world adopting BYOD initiatives, mobile security is becoming increasingly important. IT and management teams are working hard to understand and address the different methodologies and technologies available both for security and device management purposes on iOS and Android.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All