Guru's Picks

“I think therefore I am.” - René Descartes This isn’t just a pompous philosophical proposition of autonomy, instead it is a timely piece of advice for ensuring corporate cybersecurity. Descartes really was ahead of his time! Identity and access management (IAM) plays an important part in securing your IT infrastructure by mitigating risk from both external cyberattack, and internal threat. Any company that thinks seriously about protecting sensitive information about their employees or customers should...

Read more
The Rise of Inside Out Security Threats

At the 2019 RSA Conference, a survey of 650 IT professionals revealed that 75% feel vulnerable to insider threat. This information from industry experts proves that there is dichotomy in the perception of cyberthreat across the media and IT professionals. This marks a significant shift from the frequent headlines warning of external cyberattacks that frequently occur in news sources and proves the critical nature of internal threat. Indeed, the individuals surveyed, ranked user errors (39%)...

Read more
Lookout! Total App Defence is Here

Satendar Bhatia, the SVP of Embedded Software Sales at Lookout, announced yet another successful year for Lookout App Defence as they continue to break “into new markets, and acquired new customers globally”. Powered by the largest dataset of mobile code in existence, the Lookout Security Cloud provides an assessment of the entire spectrum of mobile risk in the post-perimeter world. Providing a software development kit, Lookout App Defence, allows apps to become self-defending by leveraging...

Read more

Corelight was founded by Dr. Vern Paxson (a Professor of Computer Science at UC Berkeley and Chief Scientist at Corelight), Robin Sommer (CTO) and Seth Hall (Chief Evangelist) to deliver network visibility solutions for cybersecurity built on an open source framework called Zeek (formerly Bro). Paxson began developing Zeek in 1995 when he was working at Lawrence Berkeley National Laboratory (LBNL). The software is now widely regarded as the gold standard for both NSM and...

Read more
Big wins at OneLogin Connect 19 London

OneLogin has announced the winners of several awards at its annual user conference, Connect19 London. Winners were selected from OneLogin’s customer base of over 2,500 businesses, that were evaluated based on quantitative metrics, individual usage and companywide adoption of a “security-first” mindset. Businesses were nominated across four categories: Most Collaborative, Best Cloud Growth, Most Creative Use, and the prestigious System Integrator of the Year. Dennis Reno, vice president of global customer success and technical support...

Read more
IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019

Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. This figure is seven times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses. Capitalising on weak security of IoT products, cybercriminals are intensifying their attempts...

Read more
15 New Ransomware Victims Hit Since the Start of October!

Since October 1,  Armor, a global cloud security solutions provider, has identified 15 new organizations which have been hit by ransomware in the U.S. including 5 healthcare networks and/or organizations, 2 municipalities (one of which has suffered 3 ransomware attacks this year), 3 school districts, a police department, the North Carolina State Bar,  2 Florida employment agency offices, and 1 radio station (the 10th radio station to be hit this year). Hackers Hit 5 Healthcare Networks and/or Organizations...

Read more

One Identity, the identity-centered security specialist, has released new global research, conducted by Dimensional Research, revealing the significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks. Among the survey’s most noteworthy findings is that 95% of respondents say that PtH attacks have a direct business impact on their organisations. The study of more than 1,000 global IT professionals reinforces the crucial need for...

Read more
Global 1000 Enterprises are Set to Benefit Significantly from Industry-Defining Cybersecurity Collaboration

Market-leading technology solution provider, World Wide Technology and Cybereason, the creators of leading Cyber Defence Platform, have recently announced a promising partnership. This collaboration will allow the customers of both companies to bring autonomy to their cybersecurity settings by combining multiple data sources, businesses context, machine learning and big data analytics to better protect their organizations, and proactively reduce the potential of a cybersecurity breach.   Both companies have displayed enthusiasm at the partnership that...

Read more
Volusion data breach impacts 6,500 sites including the Sesame Street store

Hackers have breached the infrastructure of Volusion, a leading e-commerce solution for small businesses, allowing them to collect customer card details from between 6,500-20,000 sites. The attack occurred via the implementation of a modified JavaScript file that included malicious code that logs card details entered in online forms code. Here's what cybersecurity experts had to say. Saryu Nayyar, CEO of Gurucul: "This incident is a reminder that data no longer resides solely in a single, on-premise data...

Read more
Page 1 of 5 1 2 5
Social media & sharing icons powered by UltimatelySocial