Member’s Login

Forgot Password  |  Create an account
Blogs

OLDER ENTRIES

Digital Future a Fragile Mix of Promise and Uncertainty: Internet Society Report

Posted By - DynamicCISO,

Entitled “Paths to our Digital Future,” the 2017 Global Internet Report examines the Internet over the next five to seven years and identifies the factors that will shape its future. The report uncovers a mix of challenges and opportunities in safeguarding the Internet for next generation.

- Read Full Article - 0 Comments

Palo Alto Networks Strengthens Ransomware Prevention Capabilities With New Traps Advanced Endpoint Functionality

Posted By - DynamicCISO,

Palo Alto Networks announced enhancements to its Traps advanced endpoint protection offering that strengthen current ransomware prevention by monitoring for new techniques and ransomware behavior and, upon detection, prevent the attack and resulting encryption of data.

- Read Full Article - 0 Comments

State of the Union 2017 - Cybersecurity: Commission Scales up EU's Response to Cyber-attacks

Posted By - DynamicCISO,

EU vows to build a stronger resilience to cyber-attacks and create an effective EU cyber deterrence and criminal law response to better protect Europe's citizens, businesses and public institutions. This is what today's Cybersecurity Package is about.

- Read Full Article - 0 Comments

Compromised LinkedIn Accounts Used to Send Phishing Links via Private Message and InMail: Malwarebytes Researcher

Posted By - DynamicCISO,

Phishing continues to be a criminals’ favourite for harvesting user credentials with more or less sophisticated social engineering tricks. In this post, we take a look at a recent attack that uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external members via email.

- Read Full Article - 0 Comments

Trend Micro Strengthens its Security Offerings in Trend Micro Security

Posted By - DynamicCISO,

In an age where safety is key, whether it be in a car, airplane or on a computer, consumers are continuing to push for enhanced safety and functionality. Yesterday Trend Micro announced strengthening of its portfolio with the release of Trend Micro Security for 2018.

- Read Full Article - 0 Comments

SSH Keys Need To Be Properly Managed To Ensure Compliance and Reduce Risk: ISACA Report

Posted By - DynamicCISO,

Secure Shell (SSH) is ubiquitous, a critical service on which the security profile of most organizations depends. Yet, according to a new report issued by ISACA and sponsored by SSH Communications Security, only rarely is that usage appropriately secured, assessed, documented and managed in a systematic and risk-aware way. Consequently, poorly managed SSH key environments may lead to compliance challenges and security breaches. The full report can be downloaded free of charge from the ISACA or SSH Communications Security web sites. The report outlines considerations that technology risk professionals, auditors, security practitioners and governance professionals should take into account as they approach the use of SSH in their enterprises. It offers guidance for the assessment of SSH usage.

- Read Full Article - 0 Comments

Nearly Half of SMBs Will Pay a Ransom on IoT Devices to Reclaim Data

Posted By - DynamicCISO,

The study, “Ransomware of Things: When Ransomware and IoT Collide,” was conducted in collaboration with Survey Sampling International and reveals that most small-to-mid-sized businesses (SMBs) do not have advanced detection and response capabilities for ransomware, advanced persistent threats (APT) and zero day attacks.

- Read Full Article - 0 Comments

Parental Control is Dead, says F-Secure

Posted By - DynamicCISO,

F-Secure SAFE provides comprehensive yet simple antivirus and Internet Security for all devices while F-Secure TOTAL offers the same award-winning protection along with F-Secure’s world-renowned FREEDOME VPN, which maintains privacy online.

- Read Full Article - 0 Comments

Cisco Spark Strengthens Security, Compliance, and Analytics

Posted By - DynamicCISO,

Cisco understands the importance of security, compliance, and analytics. It infuses this thinking into everything the company does. So it’s no surprise that its mission in collaboration has always been to give its customers incredible tools to bring ideas to life that provide world-class security and analytics.

- Read Full Article - 0 Comments

New NIST Password Guidance Provides Important Updates, But Survey Shows It Will Take Time to Implement

Posted By - DynamicCISO,

New computing password guidance from National Institute of Standards and Technology (NIST) will make for more secure and easier-to-remember passwords, but ISACA research shows it will take time to raise awareness and implement, particularly in mainframe environments.

- Read Full Article - 0 Comments

McAfee Announces MOVE AntiVirus for VMware Cloud on AWS

Posted By - DynamicCISO,

Traditional security solutions that run on every VM contribute to high disk central processing units (CPU) and memory usage resulting in reduced VM density on each hypervisor. McAfee MOVE AntiVirus solves this issue by offloading all on-access scanning to a dedicated VM that runs McAfee VirusScan Enterprise.

- Read Full Article - 0 Comments

Palo Alto Networks Announces Next-Generation Security Platform for VMware Cloud on AWS

Posted By - DynamicCISO,

Palo Alto Networks Next-Generation Security Platform allows customers to protect their on-premise, private and public cloud presence with next-generation security features that deliver superior visibility, control and threat prevention at the application level

- Read Full Article - 0 Comments

VMware Delivers Industry-First Unified End User Experience, Management and Security Solution for All Endpoint Platforms

Posted By - DynamicCISO,

Customers will now have the ability to use Workspace ONE as a single solution to enable unified endpoint management (UEM) and unify the end user experience across all endpoint platforms including Windows, macOS, Chrome OS, iOS, and Android.

- Read Full Article - 0 Comments

VMware Transforms Security for Applications Running on VMware vSphere(R)-based Virtualized and Cloud Environments

Posted By - DynamicCISO,

This new security solution leverages the virtual infrastructure to monitor running applications against their intended state and can detect and automate response to attacks that attempt to manipulate those applications.

- Read Full Article - 0 Comments

Forcepoint Acquires RedOwl, Extends Global Human-Centric Security Leadership

Posted By - DynamicCISO,

Forcepoint has announced the acquisition of RedOwl, the leader in security analytics focused on helping customers understand and manage human risk. This latest milestone in Forcepoint’s strategy arms customers with cyber security systems designed for the reality of today’s threats.

- Read Full Article - 0 Comments

Juniper Networks Introduces Contrail Security to Help Enterprises Protect Applications in Any Cloud

Posted By - DynamicCISO,

Juniper Networks launched Juniper Contrail Security, a new security and micro segmentation solution specifically designed to allow enterprises and Software-as-a-Service (SaaS) cloud providers to protect applications running in multiple cloud environments.

- Read Full Article - 0 Comments

Information Security Spending In India Will Grow 12% to Reach $1.5 Billion in 2017: Gartner

Posted By - DynamicCISO,

Spending on information security products and services in India will reach $1.5 billion in 2017 in constant currency terms, an increase of 12 percent over 2016, with spending expected to grow to $ 1.7 billion in 2018, according to the latest forecast from Gartner.

- Read Full Article - 0 Comments

Kaspersky Lab Announces IoT Device Scanner Beta to Aid Smart Home Defense

Posted By - DynamicCISO,

Kaspersky Lab has released a beta version of its solution for the "smart" home and the Internet of Things – Kaspersky IoT Scanner. This free application for the Android platform scans a home Wi-Fi network, informing the user about the devices connected to it and their level of security.

- Read Full Article - 0 Comments

User Credentials and Privileged Accounts Named Top Data Targets: SANS

Posted By - DynamicCISO,

User credentials and privileged accounts are the most common data types involved in significant breaches, according to results of a new survey by the SANS Institute. Access information is most sought after because it grants the attackers the same privilege as their victims.

- Read Full Article - 0 Comments

TCO the Biggest Cybersecurity Operations Challenge: ESG Report

Posted By - DynamicCISO,

A recent ESG research survey of 412 cyber security and IT professionals (Cybersecurity Analytics and Operations in Transition) identified some of the biggest security analytics and operations challenges.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All