Member’s Login

Forgot Password  |  Create an account
Blogs

OLDER ENTRIES

Big Gaps Emerge Between Countries on Attitudes Towards Data Protection in the Cloud

Posted By - DynamicCISO,

The findings – part of a Gemalto commissioned Ponemon Institute "2018 Global Cloud Data Security Study" – found that organizations in the UK (35%), Brazil (34%) and Japan (31%) are less cautious than those in Germany (61%)

- Read Full Article - 0 Comments

Key Highlights of 2018 Hacker One Report

Posted By - DynamicCISO,

One in four hackers have donated bounty money to charity, many hackers share knowledge freely with other hackers and security researchers, and they have helped the U.S. Department of Defense resolve almost 3,000 vulnerabilities - without receiving a cash bounty.

- Read Full Article - 0 Comments

BT and Symantec Partner to Provide Best-in-Class Endpoint Security Protection

Posted By - DynamicCISO,

BT, one of the world’s leading providers of communications services and solutions, and Symantec, the world’s leading cyber security company, have announced the availability of new endpoint protection solution for BT’s business customers.

- Read Full Article - 0 Comments

One-in-Ten Employees Are Aware of Their Organization’s IT Security Policies: Kaspersky Lab

Posted By - DynamicCISO,

According to a study of consumers conducted by Kaspersky Lab, nearly half (49%) of employees surveyed consider protection from cyberthreats a shared responsibility, but only one tenth (12%) of employed respondents claim to be fully aware of their organizations IT security policies and rules.

- Read Full Article - 0 Comments

BlackBerry Launches Game Changing Cybersecurity Product Jarvis

Posted By - DynamicCISO,

Built on the company's decades of cybersecurity expertise and proprietary technology, Jarvis is a one-of-its-kind cloud-based static binary code scanning solution that identifies vulnerabilities in software used in automobiles.

- Read Full Article - 0 Comments

Make Risk a Business Conversation and Not a Technology Issue: Sam O'Brien RSA

Posted By - Rahul Neel Mani, Editor

Governance, Risk and Compliance (GRC) plays a vital role in any organization's approach towards risk management.. Sam O’Brien, Director, and Business Leader GRC RSA APJ. In an hour-long conversation Sam spoke about the various facets of having a GRC framework and also the fallouts of not having one.

- Read Full Article - 0 Comments

Fortinet Demonstrates Integrated Security and Threat Protection for the Connected Car of the Future

Posted By - DynamicCISO,

Fortinet a global leader in broad, integrated and automated cybersecurity, last week exhibited advanced cybersecurity capabilities for the connected car of the future at CES 2018 in the Renesas Advanced and Autonomous Test Track and Future Ready Solutions Showcase.

- Read Full Article - 0 Comments

Use the Threat Pattern Life Cycle to Prevent and Mitigate IT Risk : ISACA

Posted By - DynamicCISO,

ISACA’s most recent white paper, Threat Pattern Life Cycle Development, takes this approach a step further by introducing a simple and well-defined process derived from the software development life cycle (SDLC).

- Read Full Article - 0 Comments

Cybersecurity Skills Shortage Is Getting Worse: ESG Research

Posted By - DynamicCISO,

This year’s research is based upon a survey of 620 IT and cybersecurity professionals, with respondents working in North America and Western Europe. The survey says that cybersecurity represents the biggest area where their organisations have a problematic shortage of skills.

- Read Full Article - 0 Comments

Spectre and Meltdown Attacks Against Microprocessors

Posted By - Bruce Schneier, CTO

On Wednesday, researchers just announced a series of major security vulnerabilities in the microprocessors at the heart of the world's computers for the past 15-20 years. They've been named Spectre and Meltdown.

- Read Full Article - 0 Comments

ISACA’s Collaboration With MIT Leads to New Member Benefits and Research

Posted By - DynamicCISO,

As a result of a new collaboration with the Massachusetts Institute of Technology Center for Information System Research (MIT CISR), ISACA members now get free access to briefings from MIT CISR on topics ranging from governance to digital transformation.

- Read Full Article - 0 Comments

McAfee Moves Beyond Traditional Antivirus to Protect Customers’ Identity, Connected Homes and Wi-Fi Connections

Posted By - DynamicCISO,

McAfee, one of the world’s leading cybersecurity companies, announced a new identity theft solution that goes beyond traditional antivirus to empower consumers to stay protected in the wake of recent massive data breaches.

- Read Full Article - 0 Comments

Cybercriminals Use Pirated Software to Secretly Infect PCs for Cryptocurrency Mining

Posted By - DynamicCISO,

Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’ PCs through pirated software commonly used for work and entertainment, such as photo and text editors, etc.

- Read Full Article - 0 Comments

McAfee Labs Report Sees Known Exploits and Fileless Malware Drive Record New Malware Surge

Posted By - DynamicCISO,

McAfee Labs saw malware reach an all-time high of 57.6 million new samples—four new samples per second—featuring developments such as new fileless malware using malicious macros, a new version of Locky ransomware dubbed Lukitus.

- Read Full Article - 0 Comments

BT and Symantec Partner to Provide Best-in-Class Endpoint Security Protection

Posted By - DynamicCISO,

BT, one of the world’s leading providers of communications services and solutions, and Symantec, the world’s leading cyber security company, have announced the availability of new endpoint protection solution for BT’s business customers.

- Read Full Article - 0 Comments

Companies will Invest in Studying Users’ Activities and Behaviour for Better Security Posture: Mathan Babu Kasilingam, CISO, NPCI

Posted By - Shipra Malhotra, Executive Editor

Human factors in cybersecurity is of utmost importance. Risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, and not paying attention towards these elements result into serious lapses.

- Read Full Article - 0 Comments

Eight Controls to Help Manage Shadow IT and Optimize Its Benefits: ISACA

Posted By - DynamicCISO,

While shadow IT is often stigmatised as initiated by rogue employees, that is typically far from the case. Most employees who look to use shadow IT have no ill will to harm the enterprise but instead are driven by the functionality of a tool and its ability to provide a competitive advantage.

- Read Full Article - 0 Comments

Qualys Announces Agreement to Acquire Assets of NetWatcher

Posted By - DynamicCISO,

Qualys a cloud-based security and compliance solutions provider last week announced that it has entered into an asset purchase agreement with NetWatcher, pursuant to which Qualys will acquire certain assets of NetWatcher in a cash transaction.

- Read Full Article - 0 Comments

Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017: Gartner

Posted By - DynamicCISO,

Gartner forecasts global enterprise security spending to total $96.3 billion in 2018, an increase of 8% from 2017. Organizations are spending more on security as a result of regulations, shifting buyer mindset, awareness of emerging threats and the evolution to a digital business strategy.

- Read Full Article - 0 Comments

McAfee Labs Previews Five Cybersecurity Trends for 2018

Posted By - DynamicCISO,

This year’s report focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of corporations monitoring consumers in their own homes etc.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All