Guru's Picks

The Rise of Inside Out Security Threats

At the 2019 RSA Conference, a survey of 650 IT professionals revealed that 75% feel vulnerable to insider threat. This information from industry experts proves that there is dichotomy in the perception of cyberthreat across the media and IT professionals. This marks a significant shift from the frequent headlines warning of external cyberattacks that frequently occur in news sources and proves the critical nature of internal threat. Indeed, the individuals surveyed, ranked user errors (39%)...

Read more
Lookout! Total App Defence is Here

Satendar Bhatia, the SVP of Embedded Software Sales at Lookout, announced yet another successful year for Lookout App Defence as they continue to break “into new markets, and acquired new customers globally”. Powered by the largest dataset of mobile code in existence, the Lookout Security Cloud provides an assessment of the entire spectrum of mobile risk in the post-perimeter world. Providing a software development kit, Lookout App Defence, allows apps to become self-defending by leveraging...

Read more
Corelight logo

Corelight was founded by Dr. Vern Paxson (a Professor of Computer Science at UC Berkeley and Chief Scientist at Corelight), Robin Sommer (CTO) and Seth Hall (Chief Evangelist) to deliver network visibility solutions for cybersecurity built on an open source framework called Zeek (formerly Bro). Paxson began developing Zeek in 1995 when he was working at Lawrence Berkeley National Laboratory (LBNL). The software is now widely regarded as the gold standard for both NSM and...

Read more
OneLogin Award

  OneLogin has announced the winners of several awards at its annual user conference, Connect19 London. Winners were selected from OneLogin’s customer base of over 2,500 businesses, that were evaluated based on quantitative metrics, individual usage and companywide adoption of a “security-first” mindset. Businesses were nominated across four categories: Most Collaborative, Best Cloud Growth, Most Creative Use, and the prestigious System Integrator of the Year. Dennis Reno, vice president of global customer success and technical...

Read more
Kapersky IoT malware

Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. This figure is seven times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses. Capitalising on weak security of IoT products, cybercriminals are intensifying their attempts...

Read more
Ransomeware

Since October 1,  Armor, a global cloud security solutions provider, has identified 15 new organizations which have been hit by ransomware in the U.S. including 5 healthcare networks and/or organizations, 2 municipalities (one of which has suffered 3 ransomware attacks this year), 3 school districts, a police department, the North Carolina State Bar,  2 Florida employment agency offices, and 1 radio station (the 10th radio station to be hit this year). Hackers Hit 5 Healthcare Networks and/or Organizations...

Read more
Risk Management

One Identity, the identity-centered security specialist, has released new global research, conducted by Dimensional Research, revealing the significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks. Among the survey’s most noteworthy findings is that 95% of respondents say that PtH attacks have a direct business impact on their organisations. The study of more than 1,000 global IT professionals reinforces the crucial need for...

Read more
Route to collaboration

Market-leading technology solution provider, World Wide Technology and Cybereason, the creators of leading Cyber Defence Platform, have recently announced a promising partnership. This collaboration will allow the customers of both companies to bring autonomy to their cybersecurity settings by combining multiple data sources, businesses context, machine learning and big data analytics to better protect their organizations, and proactively reduce the potential of a cybersecurity breach.   Both companies have displayed enthusiasm at the partnership that...

Read more
Sesame Street characters

Hackers have breached the infrastructure of Volusion, a leading e-commerce solution for small businesses, allowing them to collect customer card details from between 6,500-20,000 sites. The attack occurred via the implementation of a modified JavaScript file that included malicious code that logs card details entered in online forms code. Here's what cybersecurity experts had to say. Saryu Nayyar, CEO of Gurucul: "This incident is a reminder that data no longer resides solely in a single, on-premise data...

Read more
Organisations worldwide failing to adequately protect sensitive data in the cloud

A new global study from Thales, with research from the Ponemon Institute, has exposed an increasing disparity between the rapid growth of data stored in the cloud and an organisation's approach to cloud security. Although nearly half (48%) of corporate data is stored in the cloud, only a third (32%) of organisations admit they employ a security-first approach to data storage in the cloud. Surveying over 3,000 IT and IT security practitioners in Australia, Brazil, France, Germany, India...

Read more
Page 2 of 6 1 2 3 6