Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

New National Authority for Operative Cyber Defense

Posted By - DynamicCISO,

Prime Minister Benjamin Netanyahu has decided to establish a national operative cyber defense authority, The new authority will receive the necessary responsibility and authority to defend the civilian sphere from cyber threats and will constitute an operative agency that will act alongside the Israel National Cyber Bureau.

- Read Full Article - 0 Comments

Simply Secure: A New Initiative by Info Security Firms and Researchers

Posted By - DynamicCISO,

Internet giant Google, personal cloud storage provider Dropbox, the Open Technology Fund and many other renowned researcher have joined forces to create affordable, easy to use security technologies for safer future. This will be known as "Simply Secure"

- Read Full Article - 0 Comments

The Home Depot Completes Malware Elimination and Enhanced Encryption of Payment Data in All U.S. Stores

Posted By - DynamicCISO,

The Home Depot has confirmed that credit and debit cards used at stores across the United States and Canada have been compromised and the company's estimate suggests that a total of 56 million customer payment cards had been exposed between April and September 2014.

- Read Full Article - 0 Comments

IT Professionals Report a Lack of High Confidence in Preventing Cyber Attacks

Posted By - DynamicCISO,

In an era when cyber security threats are more common than ever, organisations continue to struggle to manage data securely, prepare for potential crisis scenarios, and defend against hacking and other cyber threats, according to findings from the 2014 IT Security and Privacy Survey

- Read Full Article - 0 Comments

Global Cross Industry Leaders Convene on Securing the Future of Payments

Posted By - DynamicCISO,

With the backdrop of a recent cyber threats affecting many U.S. businesses, the PCI Security Standards Council, an open global forum for the development of payment card security standards, convened cross-industry leaders in Orlando last week to collaborate on securing the future of payments.

- Read Full Article - 0 Comments

72% of Businesses Don’t Trust Cloud Vendors to Obey Data Protection Laws and Regulations

Posted By - DynamicCISO,

There is widespread mistrust of cloud providers across Europe with seven in 10 businesses accusing them of failing to comply with laws and regulations on data protection and privacy. The finding was revealed in a new study entitled “Data Breach: The Cloud Multiplier Effect in European Countries.

- Read Full Article - 0 Comments

Dispelling the Myths of Virtualisation Security

Posted By - David Emm, Principal Security Researcher, Global Research & Analysis Team, Kaspersky

The sheer capacity of virtual machines means they can handle more critical data and perform more tasks than ever before. An increasingly core part of mission-critical IT infra, virtualisation is growing as a platform for managing customer data, financial transactions, and the applications that businesses use every minute.

- Read Full Article - 0 Comments

System Failures Cause Most Large Outages of Electronic Communications Services

Posted By - DynamicCISO,

The Annual Incidents report 2013 provides an aggregated analysis of the security incidents in 2013which caused severe outages. Most incidents reported to regulators and ENISA involved mobile internet and mobile connections. The most frequent causes are system failures affecting mainly base stations and switches.

- Read Full Article - 0 Comments

IoT Security Must be Fixed for the Long Term: Beecham Report

Posted By - DynamicCISO,

The potential damage to people, possessions, businesses and national critical infrastructure from a successful attack on cyber-physical systems through the rapidly emerging Internet of Things (IoT), cannot be underestimated, according to a new study announced today by Beecham Research.

- Read Full Article - 0 Comments

Over 20% of Enterprises Will Have Digital Security Services Devoted to Protecting Business Initiatives Using the IoT by End of 2017

Posted By - DynamicCISO,

By end of 2017, over 20% of enterprises will have digital security services for protecting business initiatives using devices and services in the Internet of Things, according to Gartner, Inc. Business cases using Internet of Things (IoT) devices already exist and their role in business and industry will force enterprises to secure them.

- Read Full Article - 0 Comments

More than 75 Percent of Mobile Applications will Fail Basic Security Tests Through 2015: Gartner

Posted By - DynamicCISO,

Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner, Inc. Enterprise employees download from app stores and use mobile applications that can access enterprise assets or perform business functions, and these applications have little or no security assurances.

- Read Full Article - 0 Comments

Hacking Canon Pixma Printers - Doomed Encryption

Posted By - DynamicCISO,

This blog post is another in the series demonstrating current insecurities in devices categorised as the ‘Internet of Things’. This instalment will reveal how the firmware on Canon Pixma printers (used in the home and by SMEs) can be modified from the Internet to run custom code.

- Read Full Article - 0 Comments

VDI for Information Security

Posted By - Yonni Shelmerdine, Mobile Security Trends Analyst, Lacoon

With enterprises around the world adopting BYOD initiatives, mobile security is becoming increasingly important. IT and management teams are working hard to understand and address the different methodologies and technologies available both for security and device management purposes on iOS and Android.

- Read Full Article - 0 Comments

The Path to Mass-Producing Cyber Attacks

Posted By - DynamicCISO,

The modern production line is composed of individuals contributing to a larger process. This common manufacturing approach is efficient, effective, and profitable. Now it appears cyber attack groups in the world’s largest manufacturing country are using a similar approach to infiltrate targeted networks and compromise data.

- Read Full Article - 0 Comments

Everything You Want to Know About Cyber Crime

Posted By - DynamicCISO,

Cybercrime can affect people from all walks of life. The U.S. Department of Justice recently noted that it is presently one of the biggest threats facing the country. The increased use of technology almost ensures that various forms of cybercrime will continue to evolve and become more commonplace as the years go by.

- Read Full Article - 0 Comments

New F-Secure Threat Report: Ransomware Rising, Even on Android

Posted By - DynamicCISO,

The first half 2014 saw an increase in online attacks that lock up user data and hold it for ransom – even on mobile devices. According to F-Secure's Threat Report H1 2014, rising numbers of attacks from malicious software known as ransomware underscore the importance of data security.

- Read Full Article - 0 Comments

Juniper Expands Networks Spotlight Secure for Better Network Defence

Posted By - DynamicCISO,

Juniper Networks has announced new advancements in its security capabilities that extend the Juniper Networks Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways.

- Read Full Article - 0 Comments

Firms Must Have BYOD Policy or Risk Major Security Breaches, Cautions ITC Infotech

Posted By - DynamicCISO,

Device and data security will assume critical significance for companies adopting a BYOD policy, especially with nearly 50 per cent of companies having reported lost mobile handsets in the last year. According to IT services specialist ITC Infotech, lack of a stringent BYOD policy can lead to the risk of a major security breach.

- Read Full Article - 0 Comments

RSA Launches Advanced Security Operations Center Solution Engineered to Detect and Remediate Advanced Threats

Posted By - DynamicCISO,

RSA, The Security Division of EMC has now introduced the RSA Advanced Security Operations Center (SOC) Solution, an integrated set of technologies and services designed to help organizations identify threats before a breach can occur.

- Read Full Article - 0 Comments

The Home Depot Provides Update on Breach Investigation: Confirms Credit Card Data Breach

Posted By - ,

The Home Depot, the world's largest home improvement retailer with 2,266 retail stores in all 50 US states,, has confirmed that its payment data systems have been breached, which could potentially impact customers using payment cards at its U.S. and Canadian stores.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All