Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Mojave Networks Unveils New Application Reputation Offering

Posted By - DynamicCISO,

Mojave Networks, a cloud-based mobile security provider for enterprises, has unveiled a new application reputation feature to provide enterprises with detailed insight into the applications that are being run on employee mobile devices.

- Read Full Article - 0 Comments

F5 Networks Acquires Defense.Net, Inc.

Posted By - ,

F5 Networks has acquired Defense.Net, Inc. a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks.

- Read Full Article - 0 Comments

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang

Posted By - DynamicCISO,

Cloudera, an enterprise analytic data management powered by Apache Hadoop, announced that it has acquired Gazzang, the big data security experts, to dramatically strengthen its security offerings, building on the roadmap laid out last year when Cloudera first delivered Sentry.

- Read Full Article - 0 Comments

If Mother Nature Was A CISO

Posted By - TK Keanini, CTO

People describe the Internet as a hostile network—which is true—and that got me thinking about other hostile environments where a successful strategy results in resiliency and continuity. What if Mother Nature was the CISO? What would her strategy be?

- Read Full Article - 0 Comments

Peter Sunde of Pirate Bay Arrested in Sweden

Posted By - DynamicCISO,

The Co-founder of file sharing company Pirate Bay Peter Sunde was arrested on Saturday in Southern Sweden, reported by news agencies. Peter was convicted of aiding copyright infringement in 2009 and was sentenced to a year in prison alongwith fine.

- Read Full Article - 0 Comments

Iranian Hackers Continuously Targeting US Officials

Posted By - DynamicCISO,

Iranian hackers and spies have been continuously targeting U.S. officials from armed forces, foreign missions, media, and other key government departments, via social media, to gather intelligence as long back as 2011. This was revealed in a recently released report by iSIGHT Partners, a cyber threat intelligence firm.

- Read Full Article - 0 Comments

The Economics of Bulk Surveillance

Posted By - Bruce Schneier, CTO

All the three factors which lead to monopoly – network effects, low marginal costs and technical lock-in – are present and growing in the national-intelligence nexus itself. The Snowden papers show that neutrals like Sweden and India are heavily involved in information sharing with the NSA, even though they have tried to pretend otherwise.

- Read Full Article - 0 Comments

75% of Mobile Security Breaches Will Be Due to Mobile App Misconfiguration

Posted By - DynamicCISO,

Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, Gartner said that by 2017, 75 percent of mobile security breaches will be the result of mobile application misconfiguration.

- Read Full Article - 0 Comments

Cyber Security Market Worth $155.74 Billion by 2019

Posted By - DynamicCISO,

MarketsandMarkets has predicted that the cyber security market is estimated to grow from $95.60 billion in 2014 to $155.74 billion by 2019, at a Compound Annual Growth Rate (CAGR) of 10.3% from 2014 to 2019. In the current scenario, aerospace, defense, and intelligence vertical continues to be the largest contributor to cyber security solutions.

- Read Full Article - 0 Comments

A GRC Guide to Organizations

Posted By - DynamicCISO,

Enterprise Risk Management is the most important part of the business organization. And when asked to the forecast priorities, 33% of the respondents state that enterprise risk management is the most important. 27% of the respondents continue to say that enterprise risk management would continue to be important.

- Read Full Article - 0 Comments

Edward Snowden Reveals He Was Trained as a Spy

Posted By - DynamicCISO,

Edward Snowden sought to bolster his credentials during an interview with NBC "Nightly News" anchor Brian Williams. The one-hour interview, Snowden's first with a U.S. television network, reveals that he was trained as a spy in sort of the traditional sense of the word.

- Read Full Article - 0 Comments

Healthcare and Pharmaceutical Industry Lags in Security Effectiveness: BitSight Report Reveals

Posted By - DynamicCISO,

BitSight Technologies, the standard in Security Ratings, has released a new BitSight Insights report, revealing that the healthcare and pharmaceuticals sector has many of the same characteristics as the retail sector, including a high volume of security incidents and slow response times lagging behind the finance and utilities sectors.

- Read Full Article - 0 Comments

Indusface Launches Web Application Firewall (WAF) IndusGuard

Posted By - DynamicCISO,

Indusface an application security company has announced the availability of IndusGuard WAF, the industry’s first SECaaS (security as a service) Web Application Firewall and fully managed Application DDoS (distributed denial-of-service) solution.

- Read Full Article - 0 Comments

Mark Zuckerberg Summoned by Iranian Court Over Privacy Issues

Posted By - ,

A judge in a Court in Iran has summoned Mark Zuckerberg, Founder Facebook to court mentioning concerns over Facebook's violation of users’ privacy. Zuckerberg is asked to answer allegations why and how have Facebook apps breached people's privacy.

- Read Full Article - 0 Comments

Cert-In Issues a Vulnerability Note for IE8

Posted By - ,

A use-after-free vulnerability has been reported in Microsoft Internet Explorer (IE) 8 which could allow an unauthenticated remote attacker to execute arbitrary code on a targeted system.

- Read Full Article - 0 Comments

FBI: Cyber's Ten Most Wanted List

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

The following persons top the Federal Bureau of Investigation’s Cyber Most Wanted list:

- Read Full Article - 0 Comments

Understanding Risk And Reward In Building Relationships

Posted By - Daniel Raskin, VP of Marketing

Recently, news of Target CEO Gregg Steinhafel’s resignation has prompted a lot of discussion around who is responsible when breaches occur, especially the relationship between the CEO, CIO and CSO.

- Read Full Article - 0 Comments

Apple Patches 21 Safari Vulnerabilities

Posted By - DynamicCISO,

Apple Inc. has released a few software updates for its Safari web browser addressing multiple Webkit vulnerabilities in Mac OS X. These updates will help Apple users with over 20 security patches. The bug, for which the updates have been pushed, resides in the Safari 7.0.4 for Mac OS X Mavericks 10.9.3 and Safari 6.1.4.

- Read Full Article - 0 Comments

F5 Networks Acquires Defense.Net, Inc.

Posted By - DynamicCISO,

F5 Networks has announced its acquisition of Defense.Net, Inc. a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks.

- Read Full Article - 0 Comments

Disclosing versus Hoarding Vulnerabilities

Posted By - Bruce Schneier, CTO

There's a debate going on about whether the US government -- specifically, the NSA and United States Cyber Command -- should stockpile Internet vulnerabilities or disclose and fix them. It's a complicated problem, and one that starkly illustrates the difficulty of separating attack and defense in cyberspace.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All