Enterprises Still Struggle to Put the Sec in DevOps
Despite it being considered an essential practice, most organizations still find it difficult implementing security into their DevOps efforts. It’s not that they don’t want to, they say they do, it’s...
View ArticleGenerally Disclosing Pretty Rapidly: GDPR strapped a jet engine on hacked...
AnalysisIf Equifax's mother-of-all-security-disasters last year underlined one thing, it was that big companies think they can weather just about anything cybercriminals and regulators can throw at...
View Article中国互联网安全标准被国际接纳 取得重大进展
中新网9月12日电 9月12日,互联网域名系统北京市工程研究中心(简称域名工程中心,英文缩写ZDNS)在中国科学院软件园宣布,由中国技术人员牵头起草的互联网安全标准正式被国际社会接纳,成为互联网国际技术标准IETF RFC8416。会上还发布了自主开发的域名系统基础软件“红枫”系统、全球运行速度最快的域名服务器,以及首台国产化域名服务器。这是我国互联网社区为国际互联网技术发展作出的又一贡献。...
View ArticleTwo-thirds of emails not clean, says research
Less than a third of over half a billion emails analysed by security company FireEye were considered clean and made it to the inbox. But malware is only a small part of the email threat being served up...
View ArticleBitSight Unveils the Industry’s First Cybersecurity Performance Planning and...
BitSight Forecasting Enables Organisations to Utilise Objective Data-Driven Insights for Optimal Resource Allocation to Reduce Risk London, 12th September 2018-- BitSight , the Standard in Security...
View ArticleNew Security Research Reveals Password Inadequacy Still a Top Threat
WatchGuard’s Q2 2018 Internet Security Report uncovers heightened use of credential-focused attacks and continued prevalence of malicious Office documents 12 September 2018 New research from the...
View ArticlevArmour Named to JMP Securities Super 70 List of Hottest Privately Held...
MOUNTAIN VIEW, Calif. (BUSINESS WIRE) vArmour , the leading multi-cloud application security company, today announced that JMP Securities has named vArmour to its annual Super 70 list, representing...
View ArticleTips To Help Declutter Your Wallet In 4 Simple Steps
The society seems hell-bent on making us acquire more stuff than we actually need and most of these items clutter our wallets. Items including receipts, multiple credit cards, membership cards,...
View ArticlePersonal devices are a major threat to mobile IT environments
A new survey finds that 58 percent of respondents believe access to their network from non-corporate and personally owned devices such as laptops, desktops or mobile phones is the highest risk in...
View ArticleUnderstanding IoT Security Challenges An Interview with an Industry Expert
The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. It is no secret that security plays a very important part in the successful...
View ArticleUIDAI dismisses reports about the alleged hack of Aadhaar enrolment software
The Unique Identification Authority of India (UIDAI) on 11 September dismissed reports of hacking of Aadhaar enrolment software as 'completely incorrect and irresponsible' and said some vested...
View Article4 top challenges to a secure digital transformation
Digital transformation is vital to many companies' long-term survival, in that it can help them defend against agile startups, better meet customer expectations, find new opportunities, and reduce...
View ArticleSysdig raises $68.5 million to boost security and performance for containers...
San Francisco-based Sysdig announced today that it has raised $68.5 million in venture capital as the company rides a wave that is changing the way applications are built for the internet. The funding...
View ArticleSysdig raises $68.5 million for container security solutions
It's not a story about containers unless there are shipping containers pictured. (Pixabay) Share Written by Greg Otto Sep 12, 2018 | CyberScoop San Francisco-based Sysdig announced a $68.5 million...
View ArticleSysdig Closes $68.5 Million in Series D Funding to Enable Enterprises to...
Investment fuels company leadership in delivering converged security and monitoring solutions for enterprises adopting containers and microservices SAN FRANCISCO (BUSINESS WIRE) Sysdig, , the...
View ArticleImproving endpoint protection is top goal for IT security professionals
Three quarters of IT security professionals responding to a new survey have named improving endpoint security as one of their top two goals, with 48 percent saying it's most important. The study by...
View ArticleReport Finds Government and Military Employees Use Weak Passwords
WatchGuard Technologies' Internet Security Report for Q2 2018 states that more than50% of military and government employees use weak passwords after analyzing the data leaked from LinkedIn in 2012....
View ArticleButlin’s data breach affects 34,000 customers
Butlin’s has admitted that up to 34,000 of its customers may have been affected by a data breach. Managing Director Dermot King confirmed that Butlin’s’s database had been put at risk following “a...
View Article“响尾蝶”病毒:隐藏在手机底层的致命杀手
一、背景 日前,360核心安全团队检测到一款藏匿长达四年之久的Android系统级病毒“响尾蝶”,受影响手机用户多达十万。自2015年起,“响尾蝶”病毒便伪装为各种类型的APP进行传播,利用多个NDay漏洞获取系统最高权限,并在全球范围进行广泛传播。近日,“响尾蝶”在云端频繁更新,日趋活跃,有进一步升级的迹象。...
View ArticleISC2018观察:具象化网站安全
作为中国网络安全行业最大的年度盛会,2018 ISC大会涉及到Cyber Security的方方面面,业内的大咖分享和交流各自对某一领域的研究和实践,干货满满、受益匪浅。...
View Article