Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Fortinet Reveals "Internet of Things: Connected Home" Survey Results

Posted By - DynamicCISO,

Fortinet yesterday released the results of a global survey that probes home owners about key issues pertaining to the Internet of Things (IoT). It gives a global perspective about the Internet of Things, what security and privacy issues are in play, and what home owners are willing to do to enable it.

- Read Full Article - 0 Comments

RSA – Malware Proposal on the Open Web Increasingly Fearless

Posted By - DynamicCISO,

RSA Research has recently published an interesting update on the underground sale of malware tool, the experts have discovered a server who is offering a set of spyware tools for sale under the vendor names TampStore and Crown Softwares.

- Read Full Article - 0 Comments

Now Free NaMo Anti Virus to Protect PCs

Posted By - DynamicCISO,

An Indian IT company, based in New Delhi, Innovazion has named its new antivirus software after India's PM 'NaMo' and has promised to provide free protection to PC users against malware and virus attacks.

- Read Full Article - 0 Comments

Beware Of E-commerce Fraud And Evolving Threats

Posted By - Tom Polsdorf, IT Manager, Edgewave

Online shopping and e-commerce fraud security risks are on the rise. Read any news source and you will see references to the latest, weekly attacks against all types of organizations – retail, financial, healthcare, government, commercial – the list continues to grow every day.

- Read Full Article - 0 Comments

Security Risks from Remote-Controlled Smart Devices

Posted By - Bruce Schneier, CTO

We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from their phones. Because these devices send to have their code in firmware, a lot of them won't be patchable.

- Read Full Article - 0 Comments

US House of Reps Passes Law to Curb NSA's Electronic Surveillance Powers

Posted By - DynamicCISO,

The US House of Representatives approved a bill that would restrict the electronic surveillance powers of the National Security Agency (NSA). The margin was wide, 293 to 123, for the bill attached to the defence budget for 2015, which begins October 1.

- Read Full Article - 0 Comments

Hackers Exploit Cryptolocker Hysteria

Posted By - Alex Balan , Head of Product Management, BullGuard,

Hackers have launched a massive phishing campaign to exploit the fear generated by the Cryptolocker ransomware. A spam email campaign, discovered by BullGuard, has just been detected that offers decryption keys for Cryptolocker.

- Read Full Article - 0 Comments

Security is a Full-time Job

Posted By - Dale Rapp, Network Support, Project Management, and IT Security Expert

With all the recent security breaches making the news, it has squarely focused every ones attention on security. Most of these breaches are out of the end users control and the outcome is usually resetting passwords, selecting new pin numbers, or being issued new credit cards or debit cards.

- Read Full Article - 0 Comments

Often Made Mistakes in Fraud Prevention Programs

Posted By - Bryan Jardine, Project Manager, Easy Solutions

Over the last decade, I have spent the majority of my time focused on strategic planning for fraud prevention and fraud program enhancements. have taken the time to identify the most reoccurring themes I have seen throughout my travels and wanted to share them with you.

- Read Full Article - 0 Comments

Trend Micro Offers Advanced Security Solution for VMware vCloud Hybrid Service

Posted By - DynamicCISO,

Trend Micro has announced a solution for VMware's vCloud Hybrid Service, which enables customers to seamlessly move their on-premise or private cloud deployment to the public cloud. Trend Micro Deep Security solution features a comprehensive platform for security controls and policies.

- Read Full Article - 0 Comments

Hackers Demand Ransom From Dominos Pizza to Return Stolen Data

Posted By - DynamicCISO,

A hacking group has struck Domino's Pizza and is demanding ransom to return more than 650,000 passwords stolen from its customers based in France and Belgium. Rex Mundi had reportedly demanded €30,000 (£23,890) from the company.

- Read Full Article - 0 Comments

Why SaaS is the Best Option in the Security Software Market?

Posted By - Amit Nath, Country Manager, F-Secure

In today's world, Security as a Service (SaaS) makes good business sense. By leaving security to the professionals, businesses can focus time and resources on their commercial priorities. With SaaS, businesses get cost-effective protection provided by dedicated experts and world class technology.

- Read Full Article - 0 Comments

Secrets Of Data Loss: What The Professionals Won’t Tell You (Infograph)

Posted By - DynamicCISO,

Did you know that 60% of companies that suffer a data loss will shut down within 6 months following the incident? iSkySoft has just released an infographic that examines the impact and causes of data loss, as well as tips on recovering data and loss prevention.

- Read Full Article - 0 Comments

How To Make Security Awareness Part Of Your Work Culture

Posted By - Sara Gates, Founder and CEO, Wisegate

Research from Wisegate’s latest report, Security Awareness Programs: CISOs Share Practical, Simple Strategies, shows that most CISOs identity the user as the most commonly exploited security vulnerability, and for good reasons.

- Read Full Article - 0 Comments

SafeNet Launched Cost-Effective, High-Speed Encryption Solutions

Posted By - DynamicCISO,

SafeNet, Inc. has announced a new range of high-speed encryption (HSE) products that enable companies and other organizations to deploy best-in-class high-speed encryption more cost-effectively for data in motion. It can help reduce high-speed encryption costs by as much as 50 percent.

- Read Full Article - 0 Comments

Integrated Security Solutions Gain Share in Network Security Market: Palo Alto Managed Sequential Growth

Posted By - DynamicCISO,

Market research firm Infonetics Research released excerpts from its 1st quarter (1Q14) Network Security Appliances and Software report, which tracks integrated security appliances, secure routers, SSL VPN gateways, VPN and firewall software, and IDS/IPS products.

- Read Full Article - 0 Comments

Understanding What's Running on Your Endpoints

Posted By - Cory Plummer , Senior Consultant, Tripwire

With all of the servers, workstations, POS terminals, etc. running in a modern IT environment it can be difficult to keep track of everything happening on those devices. Security at the endpoint is really the last line of defence.

- Read Full Article - 0 Comments

Security and Data Center Vendors Renew Focus on DDoS as Attacks Multiply

Posted By - DynamicCISO,

Market research firm Infonetics Research released excerpts from its latest DDoS Prevention Appliances report, which tracks distributed denial of service (DDoS) vendors and analyzes and forecasts DDoS appliances built to protect enterprises and carriers.

- Read Full Article - 0 Comments

Bank of England Launches New Framework to Test for Cyber Vulnerabilities

Posted By - DynamicCISO,

In a speech at the British Bankers’ Association, Andrew Gracie, Executive Director, Resolution at the Bank of England, formally launched a new framework to help identify areas where the financial sector could be vulnerable to sophisticated cyber-attack.

- Read Full Article - 0 Comments

Advanced Cyber Attacks Reliant on Privileged Credential Exploitation

Posted By - DynamicCISO,

A new cyber-security report reveals that while new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage by exploiting privileged accounts.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All