Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Vodafone Law Enforcement Disclosure Report Released

Posted By - DynamicCISO,

Vodafone, one of the world’s largest telecom service providers, has published its first "Law Enforcement Disclosure Report", in which it revealed that a small number of countries by law have direct access to the provider’s network.

- Read Full Article - 0 Comments

Panda Security launches Panda GateDefender eSeries 5.5

Posted By - DynamicCISO,

Panda Security, the Cloud Security Company, has announced the inclusion of new and enhanced features in version 5.50 of Panda GateDefender eSeries, the company’s unified perimeter security device that protects against all types of threats.

- Read Full Article - 0 Comments

Google Releases End-to-End Encryption Extension

Posted By - DynamicCISO,

Google has released an early version of a Chrome extension that provides end-to-end encryption for data leaving the browser. The extension will allow users to encrypt emails from their webmail accounts.

- Read Full Article - 0 Comments

The Rise Of The Deep Web

Posted By - Mark Gibson, Sales Director

The Deep Web was a topic of much speculation at this year’s Infosecurity Europe following a key note address by Troels Oerting, the head of the European Cybercrime centre. The issue, said Oerting, was that law enforcement agencies found it hard to penetrate the Deep Web making it hard for those fighting cyber crime to ‘do their homework’

- Read Full Article - 0 Comments

The Best Of Both Worlds – Soraya

Posted By - Matthew Bing, Research Analyst

Arbor Networks’ ASERT has recently discovered a new malware family that combines several techniques to steal payment card information. Dubbed Soraya, meaning “rich,” this malware uses memory scraping techniques similar to those found in Dexter to target point-of-sale terminals.

- Read Full Article - 0 Comments

Mojave Networks Unveils New Application Reputation Offering

Posted By - DynamicCISO,

Mojave Networks, a cloud-based mobile security provider for enterprises, has unveiled a new application reputation feature to provide enterprises with detailed insight into the applications that are being run on employee mobile devices.

- Read Full Article - 0 Comments

F5 Networks Acquires Defense.Net, Inc.

Posted By - ,

F5 Networks has acquired Defense.Net, Inc. a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks.

- Read Full Article - 0 Comments

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang

Posted By - DynamicCISO,

Cloudera, an enterprise analytic data management powered by Apache Hadoop, announced that it has acquired Gazzang, the big data security experts, to dramatically strengthen its security offerings, building on the roadmap laid out last year when Cloudera first delivered Sentry.

- Read Full Article - 0 Comments

If Mother Nature Was A CISO

Posted By - TK Keanini, CTO

People describe the Internet as a hostile network—which is true—and that got me thinking about other hostile environments where a successful strategy results in resiliency and continuity. What if Mother Nature was the CISO? What would her strategy be?

- Read Full Article - 0 Comments

Peter Sunde of Pirate Bay Arrested in Sweden

Posted By - DynamicCISO,

The Co-founder of file sharing company Pirate Bay Peter Sunde was arrested on Saturday in Southern Sweden, reported by news agencies. Peter was convicted of aiding copyright infringement in 2009 and was sentenced to a year in prison alongwith fine.

- Read Full Article - 0 Comments

Iranian Hackers Continuously Targeting US Officials

Posted By - DynamicCISO,

Iranian hackers and spies have been continuously targeting U.S. officials from armed forces, foreign missions, media, and other key government departments, via social media, to gather intelligence as long back as 2011. This was revealed in a recently released report by iSIGHT Partners, a cyber threat intelligence firm.

- Read Full Article - 0 Comments

The Economics of Bulk Surveillance

Posted By - Bruce Schneier, CTO

All the three factors which lead to monopoly – network effects, low marginal costs and technical lock-in – are present and growing in the national-intelligence nexus itself. The Snowden papers show that neutrals like Sweden and India are heavily involved in information sharing with the NSA, even though they have tried to pretend otherwise.

- Read Full Article - 0 Comments

75% of Mobile Security Breaches Will Be Due to Mobile App Misconfiguration

Posted By - DynamicCISO,

Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, Gartner said that by 2017, 75 percent of mobile security breaches will be the result of mobile application misconfiguration.

- Read Full Article - 0 Comments

Cyber Security Market Worth $155.74 Billion by 2019

Posted By - DynamicCISO,

MarketsandMarkets has predicted that the cyber security market is estimated to grow from $95.60 billion in 2014 to $155.74 billion by 2019, at a Compound Annual Growth Rate (CAGR) of 10.3% from 2014 to 2019. In the current scenario, aerospace, defense, and intelligence vertical continues to be the largest contributor to cyber security solutions.

- Read Full Article - 0 Comments

A GRC Guide to Organizations

Posted By - DynamicCISO,

Enterprise Risk Management is the most important part of the business organization. And when asked to the forecast priorities, 33% of the respondents state that enterprise risk management is the most important. 27% of the respondents continue to say that enterprise risk management would continue to be important.

- Read Full Article - 0 Comments

Edward Snowden Reveals He Was Trained as a Spy

Posted By - DynamicCISO,

Edward Snowden sought to bolster his credentials during an interview with NBC "Nightly News" anchor Brian Williams. The one-hour interview, Snowden's first with a U.S. television network, reveals that he was trained as a spy in sort of the traditional sense of the word.

- Read Full Article - 0 Comments

Healthcare and Pharmaceutical Industry Lags in Security Effectiveness: BitSight Report Reveals

Posted By - DynamicCISO,

BitSight Technologies, the standard in Security Ratings, has released a new BitSight Insights report, revealing that the healthcare and pharmaceuticals sector has many of the same characteristics as the retail sector, including a high volume of security incidents and slow response times lagging behind the finance and utilities sectors.

- Read Full Article - 0 Comments

Indusface Launches Web Application Firewall (WAF) IndusGuard

Posted By - DynamicCISO,

Indusface an application security company has announced the availability of IndusGuard WAF, the industry’s first SECaaS (security as a service) Web Application Firewall and fully managed Application DDoS (distributed denial-of-service) solution.

- Read Full Article - 0 Comments

Mark Zuckerberg Summoned by Iranian Court Over Privacy Issues

Posted By - ,

A judge in a Court in Iran has summoned Mark Zuckerberg, Founder Facebook to court mentioning concerns over Facebook's violation of users’ privacy. Zuckerberg is asked to answer allegations why and how have Facebook apps breached people's privacy.

- Read Full Article - 0 Comments

Cert-In Issues a Vulnerability Note for IE8

Posted By - ,

A use-after-free vulnerability has been reported in Microsoft Internet Explorer (IE) 8 which could allow an unauthenticated remote attacker to execute arbitrary code on a targeted system.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All