Member’s Login

Forgot Password  |  Create an account
Blogs

MOST READ BLOGS

Step by Step Guide to Application Security Penetration Testing

Posted By - DynamicCISO,

This document will guide you to penetrate web applications step by step. The objective of this article is to help the Security Analyst/Penetration Testers/Developers/Ethical Hackers to follow a step by step penetration testing process, discover the vulnerability, and exploit and mitigate the same.

- Read Full Article - 0 Comments Share:

Why Outsourced Security Benefits

Posted By - Rishikesh Kamat, General Manager, Product Development & Marketing, Netmagic

Economic turmoil and unpredictable market conditions have put organizations on a cautious path in business. As new and disruptive technologies take over enterprise IT strategies, the obvious attention is towards information security – the increasing complexities, costs and skills required to manage security.

- Read Full Article - 0 Comments Share:

Facebook to Let Users Log into Third-party Apps Anonymously

Posted By - DynamicCISO,

Facebook has introduced Anonymous Login for third-party apps. With Anonymous Login, users can login to new apps without having to create a new account. The feature which is available on both web and mobile is specially for those users who are not comfortable to sign in by providing real information.

- Read Full Article - 0 Comments Share:

Heartbleed FAQs

Posted By - Richard Henderson, Security Strategist FortiGuard Labs

Heartbleed bug took the world by a storm. It is an unprecedented incident that has caught the global information security community totally unawares. What is it? How does it work? What it does? All the reasonable questions need answers. Here's an FAQ for your ready reference.

- Read Full Article - 0 Comments Share:

Heartbleed

Posted By - Bruce Schneier, CTO

The Heartbleed bug allows to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content.

- Read Full Article - 0 Comments Share:

21% of Websites Still Use SHA-1: Venafi Research

Posted By - DynamicCISO,

SHA-1 is on the verge of breathing its last. But someone needs to notify the next of kin, because new research from Venafi Labs shows that 1 in 5 of the world’s websites are still using certificates signed with the vulnerable Secure hash algorithm, SHA-1.

- Read Full Article - 0 Comments Share:

500,000-per-day SMS Spammer Gets Just £4,000 Fine

Posted By - DynamicCISO,

An Indian call-centre operator has been fined by a London court for breaching Data Protection laws, but despite his operation bombarding UK cell phones with spams, his punishment amounts to little more than a slap on the wrist.

- Read Full Article - 0 Comments Share:

Dell Makes PCs Even More Secure With New BIOS Verification and Advanced Threat Protection Technology

Posted By - DynamicCISO,

Dell yesterday announced the availability of the Dell Data Protection | Endpoint Security Suite Enterprise, which integrates Cylance technology using artificial intelligence and machine learning to proactively prevent advanced persistent threats and malware.

- Read Full Article - 0 Comments Share:

72% of Businesses Don’t Trust Cloud Vendors to Obey Data Protection Laws and Regulations

Posted By - DynamicCISO,

There is widespread mistrust of cloud providers across Europe with seven in 10 businesses accusing them of failing to comply with laws and regulations on data protection and privacy. The finding was revealed in a new study entitled “Data Breach: The Cloud Multiplier Effect in European Countries.

- Read Full Article - 0 Comments Share:

ISACA Identifies Five Cyber Risk Trends for 2016

Posted By - DynamicCISO,

The shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five cyber risk trends for the coming year that CISOs and CIOs should have on their radar.

- Read Full Article - 0 Comments Share:

See How the Cost of Cyber Crime has Climbed in 2014

Posted By - DynamicCISO,

In the United States and around the world, companies just keep spending more to defend their organizations against cybercriminals. While dispiriting, this recent news from the Ponemon Institute’s 2014 Cost of Cyber Crime reportisn’t much of a surprise for security professionals. I

- Read Full Article - 0 Comments Share:

iPhone Encryption and the Return of the Crypto Wars

Posted By - Bruce Schneier, CTO

Last week, Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone's encryption only protected a small amount of the data, and Apple had the ability to bypass security on the rest of it.

- Read Full Article - 0 Comments Share:

Sony Hackers Leaked Movies to File-Sharing Sites

Posted By - DynamicCISO,

The devastating hacking attack against Sony Pictures Entertainment entered a new phase this weekend, after it was revealed that five unreleased Sony-made films have leaked onto file-sharing Internet sites

- Read Full Article - 0 Comments Share:

Firms Must Have BYOD Policy or Risk Major Security Breaches, Cautions ITC Infotech

Posted By - DynamicCISO,

Device and data security will assume critical significance for companies adopting a BYOD policy, especially with nearly 50 per cent of companies having reported lost mobile handsets in the last year. According to IT services specialist ITC Infotech, lack of a stringent BYOD policy can lead to the risk of a major security breach.

- Read Full Article - 0 Comments Share:

Breaches Won't Stop, You Have to Raise the Level of Your Cyber Defence

Posted By - Rahul Neel Mani, Editor

Peter Tran GM & Senior Director at RSA Security (Worldwide Advanced Cyber Defense Practice) spoke to dynamicCISO during the RSA Conference 2017 last month on various aspects of incident response and how RSA’s ACD can help organizations in making sense of their security programs.

- Read Full Article - 0 Comments Share:

FireEye Acquires Threat Intelligence Company iSIGHT Partners

Posted By - DynamicCISO,

FireEye, the leader in stopping advanced cyber attacks, last week announced the acquisition of privately held iSIGHT Partners, one of the world’s leading providers of cyber threat intelligence for global enterprises. The transaction closed on January 14, 2016.

- Read Full Article - 0 Comments Share:

IT Leaders Reveal Harsh Realities of Protecting Businesses in Fortinet Global Security Survey

Posted By - DynamicCISO,

90% of CIOs and CTOs believe the job of keeping their enterprise protected is becoming challenging according to new research from Fortinet. Serious boardroom pressure to keep the enterprise secure has jumped almost 1/3rd in past 1 year, making security paramount and a primary consideration over other business initiatives.

- Read Full Article - 0 Comments Share:

Disclosing versus Hoarding Vulnerabilities

Posted By - Bruce Schneier, CTO

There's a debate going on about whether the US government -- specifically, the NSA and United States Cyber Command -- should stockpile Internet vulnerabilities or disclose and fix them. It's a complicated problem, and one that starkly illustrates the difficulty of separating attack and defense in cyberspace.

- Read Full Article - 0 Comments Share:

ThreatMetrix Replaces Conventional Authentication with Digital Identity Graph; Vows for Global Shared Intelligence

Posted By - DynamicCISO,

ThreatMetrix, The Digital Identity Company, unveiled at the RSA Conference its innovation in the fight against global cybercrime – the Digital Identity Graph. Radically different than the Social Graph popularized by Facebook, ThreatMetrix has developed the graph framework for anonymized global digital identities on the internet to fight cybercrime.

- Read Full Article - 0 Comments Share:

The World’s Most Unusual Data Centers

Posted By - DynamicCISO,

This infographic reveals that the world of data centers is way more interesting than you might have believed, and amongst the staggering number of more than 500,000 data centers, there are some highly innovative and no less fascinating wonders of technology to learn about.

- Read Full Article - 0 Comments Share:

The Way of the Future – Securing the Internet of Things (IoT)

Posted By - Cricket Liu, Chief Infrastructure Officer, Infoblox

According to no less an authority than Gartner, the number of connected “things” is set to reach 26 billion by 2020. That’s almost 30 times the number of devices connected to the IoT in 2009, and these numbers don’t even include PCs, tablets and smartphones.

- Read Full Article - 0 Comments Share:

Infosys Staffers' ICICI Salary Accounts Hacked: Lakhs Siphoned Off

Posted By - DynamicCISO,

In a case of internet fraud, the salary accounts of more than 23 employees of software major, Infosys, in several cities across the country were hacked and money siphoned off in May this year. The fraud has forced ICICI, the official bank of the company to refund the amounts.

- Read Full Article - 0 Comments Share:

Focus on Internal Vulnerabilities, Comprehensive Security Education: Amit Singh, Country Manager India, Dell-SonicWALL

Posted By - Rahul Neel Mani, Editor

DynamicCISO, in its effort to reach out to the information security vendors, spoke to Amit Singh, Country Manager, Dell-SonicWALL India and probed him on the threat scenario, cyber attack landscape and the efforts Dell-SonicWALL is making to help Indian enterprises fight the cyber security threats.

- Read Full Article - 0 Comments Share:

Hire InfoSec Professionals or Security Certifications?

Posted By - Ong Yew Chuan, Assistant Lecturer at Universiti Sultan Zainal Abidin (UniSZA)

In the Information Security field, there is a myth that you need certification to survive as a professional. Don’t believe me? Browse through the infosec job ads, and you will see SANS, CISSP and security certifications, including CISSP and EC-Council, are preferred.

- Read Full Article - 0 Comments Share:

IoT Security Must be Fixed for the Long Term: Beecham Report

Posted By - DynamicCISO,

The potential damage to people, possessions, businesses and national critical infrastructure from a successful attack on cyber-physical systems through the rapidly emerging Internet of Things (IoT), cannot be underestimated, according to a new study announced today by Beecham Research.

- Read Full Article - 0 Comments Share:

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All