ICO Slaps TalkTalk with 400K Fine After Breach
New information commissioner Elizabeth Denham has sent an uncompromising message to UK organizations that cybersecurity is a boardroom matter, by issuing a 400,000 fine to ISP TalkTalk for security...
View ArticleVendor Security Alliance questionnaire: Starting a security discussion with...
The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating large well-protected targets...
View ArticleSecuring Office 365? There's always more you can do
Wherever you look there's yet another SME or enterprise migrating to Office 365. This says a lot for the attractiveness of cloud-based office suites, and perhaps it also says something about the...
View Article8 challenges that keep financial services CTOs and CIOs up at night
Being the CTO or CIO of a financial services provider is harder than ever in today’s data-driven, hacker-plagued digital world. In addition to making sure the organization’s systems are operating...
View ArticleThe Challenge of Securing Multi-Cloud Environments
When I talk to companies interested in moving some of their IT infrastructure and operations to a cloud service provider, it’s clear this shift has become a fundamental business requirement to keep up...
View ArticleExclusive: Ex-Yahoo Info Chief’s Startup Raises Millions
Mike Kail, the former chief information officer at Yahoo yhoo who resigned from his post last year amid a legal spat withNetflix, his previous employer, has landed new funding for his startup. Kail is...
View Article黑客事件发酵:传Verizon要求雅虎降10亿美元甩卖?
黑客事件发酵:传Verizon要求雅虎降10亿美元甩卖? 1小时前来源:花火网 黑客事件发酵:传Verizon要求雅虎降10亿美元甩卖?《纽约邮报》援引消息人士的说法称,在以48亿美元收购雅虎的交易中,Verizon希望雅虎能给予10亿美元的折扣。不过,雅虎的交易团队正在尽一切可能阻止交易降价。...
View ArticleAll That New Google Hardware? It’s a Trojan Horse for AI
The focusof Google’s bighardware event this week wasn’t thehardwareat all. It was Assistant, the artificially intelligentdigital helper that catersto your every whim and powersyour every interaction....
View ArticleDealing with Anti-Virus False Positives
I've been working onMarkdown Monster for a while now, but in recent months I've been plagued with Anti-Virus false positives for the installation executable. I didn't realize anything was wrong at...
View ArticleHow Can We Make Cyber Security Great Again or Great For the First Time
“How many of you have setup the 2-step verification process for your email?” asked Scott Carpenter to the room of participants at the Data for Good Exchange 2016 conference at Bloomberg.Less than a...
View ArticleCloud Native Trends Picking Up Legacy Security Losing Ground
Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications....
View ArticleThe Pixel and Pixel XL may gain support for Android-based OS with amped up...
The Pixel and Pixel XL may gain support for Android-based OS with amped up security CopperheadOS is an Android-based mobile operating system primarily focused on security. It is a new endeavor by а...
View ArticleMobile App Collusion Can Bypass Native Android Security
DENVER Android’s native security mechanisms, most notably application sandboxing, secure devices against threats from one app at a time. Multiple apps however, can collude in different ways and bypass...
View ArticleKaspersky Lab and Citrix Accelerate Security and Performance of Secure App...
Kaspersky Lab announced that the company was named partner of the month for August 2016 by Citrix Ready, a program that helps customers identify third-party solutions that are recommended to enhance...
View ArticleThe State of Cybersecurity Professional Careers
I’ve written about and researched the cybersecurity skills shortage for many years. For example, ESG research indicates that 46% of organizations claim to have a “problematic shortage” of cybersecurity...
View ArticleWhy It's Always Cyber Hunting Season (& What To Do About It)
Why Its Always Cyber Hunting Season (& What To Do About It) To stop today's most capable and persistent adversaries, security organizations must rely less on tools and more on human analysis....
View ArticleSecurity Think Tank: Combine technology and communication to combat phishing...
At a recent Black Hat conference in the US, nearly half the delegates who were polled about phishing scams said they were not confident their company’s executives could spot one. So, dear reader, how...
View ArticleTrust the cloud, we’re getting the hang of securing it, says Unisys security...
IPExpoEveryone’s starting to believe in public cloud but security remains an uphill battle, Unisys’ chief trust officer Tom Patterson told The Register this morning. “There are no four walls any...
View ArticleCyber Security Awareness Month: Let’s Fight Back Together
National Cyber Security Awareness Month , which is observed every October, isan opportunity for us as a nation to spotlightsecurity issues that impact our daily lives. As proven by the exponential...
View ArticleOracle JET and ADF BC REST Security Integration Approach
I have promised to atendee of my OOW'16 session (Building Enterprise-Grade Mobile Apps with Oracle JET and Cordova [CON5731]) to post a blog about ADF BC REST security and integration with Oracle JET....
View Article