Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Trend Micro Announces Comprehensive Capabilities for Microsoft Office 365 Customers

Posted By - DynamicCISO,

As more organisations transition to the cloud for increased efficiencies and streamlined management of IT infrastructure, Trend Micro announced upcoming new and enhanced capabilities for Microsoft Office 365 customers.

- Read Full Article - 0 Comments

Reducing Incident Backlog: A Game Changer for Security Analysts

Posted By - Paul Nguyen, President, Global Security Solutions at CSG Invotas

The Cisco 2014 Annual Security Report points to a worldwide shortage of skilled security professionals. The daily working lives of security analysts are affected by this shortage, and one of the biggest obstacles they face is the backlog of security incidents generated as part of their incident response plans.

- Read Full Article - 0 Comments

Cyber Defense Maturity Report 2014

Posted By - DynamicCISO,

This independent research conducted by IDG Connect, on behalf of FourScout, offers key insights into the nature of security issues impacting organizations; the perceived maturity of process, controls and tools applied to preempt and contain exposures etc.

- Read Full Article - 0 Comments

Unisys Survey Reveals Nearly 70 Percent of Critical Infrastructure Providers Have Been Breached in the Past Year

Posted By - DynamicCISO,

Nearly 70 percent of companies surveyed that are responsible for the world’s power, water and other critical functions have reported at least one security breach that led to the loss of confidential information or disruption of operations in the past 12 months, reports a Survey by Ponemon & Unisys.

- Read Full Article - 0 Comments

AVAST Demonstrates Risk of Selling Used Smartphones – Recovers 40,000 Personal Photos and Emails from Phones Bought Online

Posted By - DynamicCISO,

AVAST Software, makers of the free anti-virus software, easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, AVAST was able to recover more than 40,000 personal photos, emails, text messages, and – in some cases – the identities of the sellers.

- Read Full Article - 0 Comments

Vitalwerks and Microsoft Reach Settlement

Posted By - DynamicCISO,

On Monday, June 30 2014, Microsoft filed a civil suit in a Nevada federal court to disrupt Bladabindi-Jenxcus, a pervasive family of malware that put millions of customers at risk.. Yesterday, both Microsoft Corporation and Vitalwerks Internet Solutions, LLC announce they have reached a settlement.

- Read Full Article - 0 Comments

Kaspersky Lab on Cybercriminals Who Take Advantage of Cloud Services

Posted By - DynamicCISO,

By following these recommendations, users inadvertently create different kinds of security gaps which can be easily exploited by cybercriminals – particularly in the case of targeted attacks. Kaspersky Lab experts decided to have a closer look at the risk of a corporate network being infected via cloud services.

- Read Full Article - 0 Comments

Cybercrime Bust Frees 4.7 Million Infected PCs: Microsoft

Posted By - DynamicCISO,

n news flashes that are still coming in, Microsoft has claimed to have freed nearly 4.7 million infected PCs from the clutches of the cyber crooks. According to the company's claim, this is the most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week.

- Read Full Article - 0 Comments

Cybercrime Operation Frees 4.7 Million Infected PCs: Microsoft

Posted By - DynamicCISO,

In news flashes that are still coming in, Microsoft has claimed to have freed nearly 4.7 million infected PCs from the clutches of the cyber crooks. According to the company's claim, this is the most successful digital crime-busting operation, which interrupted service at an Internet-services firm last week.

- Read Full Article - 0 Comments

Germany Expels Top CIA Official in Spy Row

Posted By - DynamicCISO,

Yesterday, Germany expelled a top CIA official (station chief in Berlin) in the ongoing row over alleged spying by the US. This is perhaps the most bitter diplomatic war between the Western allies, which otherwise have been working together on all fronts.

- Read Full Article - 0 Comments

Financial Fraud in the Digital Age

Posted By - DynamicCISO,

Anyone who has a job, uses the Internet, or puts their finances and income in the hands of individuals and institutions, is susceptible to fraud. In some cases, it doesn’t even matter the number of security precautions an individual may take.

- Read Full Article - 0 Comments

FireEye Combines Advanced Threat Protection With Traditional Email Security to Deliver Comprehensive Email Threat Prevention Cloud

Posted By - DynamicCISO,

FireEye the leader in stopping today's advanced cyber attacks, today announced the new release of FireEye Email Threat Prevention Cloud that adds the traditional email security features of anti-spam and anti-virus protection to its advanced threat detection capabilities.

- Read Full Article - 0 Comments

McAfee Features in Leaders Quadrant for SIEM in Gartner's Magic Quadrant

Posted By - DynamicCISO,

McAfee, part of Intel Security, announced that Gartner has positioned the company in the leaders quadrant in its “Magic Quadrant for Security Information and Event Management” as published on June 25, 2014.

- Read Full Article - 0 Comments

The World’s Most Unusual Data Centers

Posted By - DynamicCISO,

This infographic reveals that the world of data centers is way more interesting than you might have believed, and amongst the staggering number of more than 500,000 data centers, there are some highly innovative and no less fascinating wonders of technology to learn about.

- Read Full Article - 0 Comments

First Ever Magic Quadrant for Web Application Firewalls

Posted By - DynamicCISO,

The WAF market is growing quickly from a small base; it is composed of pure players, application delivery controller vendors, cloud service providers and network security vendors. Buyers should evaluate how WAFs can provide high security, minimize false positives and sustain performance.

- Read Full Article - 0 Comments

Physical Location of Data Will Become Irrelevant in Post-Snowden Era: Gartner

Posted By - ,

The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical location in most organizations by 2020, according to a report from Gartner Inc.

- Read Full Article - 0 Comments

Cybercrime Causing India Huge Financial Losses: Delhi High Court Report

Posted By - DynamicCISO,

In India, Cybercrimes have cost about Rs 24,630 crore (USD 4 billion) in 2013, reveals a Delhi High Court-commissioned report. The Report is submitted by Surinder S Rathi, additional district judge and OSD to Delhi Legal Service Authority (DLSA), before the court.

- Read Full Article - 0 Comments

Russia Passes New Bill Restricting Internet

Posted By - DynamicCISO,

Russia's Parliament has passed a bill on requiring Internet companies to store the personal data of Russians inside Russia only. This is a move to put pressure on social network sites such as Facebook and Twitter into handing over user data.

- Read Full Article - 0 Comments

Why Identity Management Is the New Security

Posted By - Paul Moore, Chief Technology Officer and Founder of Centrify

When even the most powerful Internet companies are vulnerable, it’s time to ask if traditional security measures—such as antivirus software, passwords, VPNs and firewalls—are still capable of doing the job. Unfortunately, the answer seems to be a resounding ‘no’.

- Read Full Article - 0 Comments

Open Internet is Challenged by Nation-state Crackdowns, Surveillance, and Pressures of Commercialization of the Internet

Posted By - DynamicCISO,

As Internet experts look to the future of the Web, the number of concerns are growing. The Experts say liberty online is challenged by nation-state crackdowns, surveillance, and pressures of commercialisation of the Internet.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All