home.aspx

 
. home.aspx home.aspx

ARCHIVED NEWS


    SECURITY PROS SUPPORT DATA COLLECTION REGULATIONS

    Apr 27, 2018

    While most security professionals believe that government officials lack a real understanding of the threats to digital privacy, they overwhelmingly agree that governments should regulate the way social media companies collect user data. At last week’s RSA Conference, more than 500 security pr...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50445044

    MOST ORGANISATIONS UNPREPARED FOR GDPR, SURVEY FINDS

    Apr 27, 2018

    Despite the vast majority of businesses agreeing that GDPR affects them, only 5% say they are fully prepared for it, according to a BSI survey. Only 5% of businesses feel ready for the arrival of the General Data Protection Regulation (GDPR), research suggests, despite the data protection reforms co...

    COMPUTER WEEKLY
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50455045

    MICROSOFT RELEASES WINDOWS 10 SECURITY PACK

    Apr 27, 2018

    Microsoft has released a download pack that incorporates NCSC guidance to save UK companies weeks of work to secure Windows 10 and comply with government guidelines. Microsoft has worked with the UK’s National Cyber Security Centre (NCSC) to put their guidance on securing Windows 10 into a dow...

    COMPUTER WEEKLY
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50465046

    SENTINELONE CEO: ENDPOINT SECURITY MARKET FULL OF 'NOISE AND CONFUSION'

    Apr 27, 2018

    In part two of the interview with SentinelOne CEO Tomer Weingarten, he discusses how niche products and venture capital investments have affected the endpoint security space. In part two of the interview with SentinelOne CEO Tomer Weingarten, he discusses how niche products and venture capital inves...

    TECHTARGET
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50625062

    FINNISH R&D AND UTILITIES IN LINE OF CYBER ESPIONAGE FIRE, SAY SECURITY POLICE

    Apr 26, 2018

    Finnish research and development, as well as critical infrastructure, are being targeted by state-backed cyber espionage attacks, says report. Foreign states are attempting to steal information about Finland’s critical infrastructure and product development, Finnish security intelligence servi...

    COMPUTER WEEKLY
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50365036

    GDPR COMPLIANCE REQUIREMENTS DON'T COME CHEAP

    Apr 26, 2018

    GDPR has more teeth than any previous data privacy directive, but that looming threat hasn't motivated many companies to get their audit trail in order. Not ready for GDPR to go into effect next month? There's some good news and some bad news. The bad news: The European Union regulation has ...

    TECHTARGET
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50375037

    KEEP HACKERS LOCKED OUT OF HOTEL ROOMS

    Apr 26, 2018

    It’s rare to check into any hotel today and be handed an actual door key. Global hotel chains and hotels worldwide have transitioned from the lock and keys of old to an electronic system so that guests need only swipe a card in front of the door. But researchers at F-Secure Cyber Security Serv...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50385038

    CADENCE IN CHAOS: SOUNDS OF DDOS IN NETFLOW LOGS

    Apr 26, 2018

    For those who appreciate the healing power of music, new research could prove to be a magical security tool. By correlating traffic types from NetFlow logs with sounds of instruments, researchers at Imperva were able to translate changes in network traffic into song. Inspired by a TED Talk called &q...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50395039

    BRITISH BANKS TARGET ISRAELI SECURITY TECHNOLOGY

    Apr 26, 2018

    British banks are working with former Israeli military cyber security specialists to secure the banking infrastructure against cyber attacks, as London seeks to boost its position as a global financial centre in the run up to Brexit, according to a British-Israeli research organisation. Israeli cybe...

    COMPUTER WEEKLY
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50405040

    ALEXA TURNED SPY, ABLE TO SNOOP ON USERS

    Apr 26, 2018

    Amazon put a quick stop to an issue in Alexa’s skill set after Chexmarx researchers reported that her skill set could be expanded to listen in on users not just some of the time but all of the time. According to a Checkmarx research paper, Alexa skills can be developed in different languages u...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50415041

    FIGHT TO GET SMBS PCI COMPLIANT A LOSING BATTLE

    Apr 26, 2018

    Being in compliance with different regulations has a bottom-line impact on business, but smaller organizations lack the time and knowledge necessary to engage with PCI (Payment Card Industry) programs. That's according to the Acquirer PCI Sentiment Survey recently released by Sysnet Global Solut...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50435043

    MAJOR TAKEDOWN OF SITE SELLING CYBERATTACKS

    Apr 25, 2018

    Administrators of the world's largest DDoS-as-a-service website webstresser.org were only yesterday reaping the rewards of their illicit enterprise. Today, they are under arrest thanks to the cooperative effort of international law enforcement agencies. Eruopol reported the success of Operation ...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=50325032

TRENDING NEWS


    OKTA ADVANCES BUSINESS APPLICATION AUTHENTICATION WITH NEW SERVICES

    May 24, 2018

    With new and improved contextual awareness capabilities, paired with analytics, Okta is aiming to help enable the password-less future for authentication. Enterprise identity management vendor Okta announced a series of new products and updates on May 23 that aim to advance the state of access secur...

    EWEEK
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51355135

    FEDERAL HR WANTS TO MODERNIZE CYBERSECURITY RECRUITING, PAY

    May 24, 2018

    The U.S. Dept. of Homeland Security wants to modernize recruitment and management of its cybersecurity workforce. It is asking vendors to explain how DHS can achieve its goals. The U.S. Dept. of Homeland Security wants dramatic changes in hiring and management of cybersecurity professionals. It seek...

    TECHTARGET
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51365136

    IDC, CISCO SURVEY ASSESSES FUTURE IT STAFFING NEEDS

    May 24, 2018

    New IDC survey on digital transformation's effects on future IT staffing outline technology trends affecting IT hiring and 20 roles that emphasize need for expanded skill sets. Network engineers, architects and administrators will be among the most critical job positions to fill if enterprises a...

    TECHTARGET
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51375137

    HOW YOUR WEB BROWSER TELLS YOU WHEN IT'S SAFE

    May 23, 2018

    As Google moves to change how its Chrome browser flags insecure websites, rival browsers may be forced to follow suit. Here's how other browsers currently handle website security and what changes they have coming. Google last week spelled out the schedule it will use to reverse years of advice f...

    COMPUTERWORLD
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51305130

    U.S. DISRUPTS RUSSIAN BOTNET OF 500,000 HACKED ROUTERS

    May 23, 2018

    The US Justice Department said Wednesday that it had seized an internet domain that directed a dangerous botnet of a half-million infected home and office network routers, controlled by hackers believed tied to Russian intelligence. The move was aimed at breaking up an operation deeply embedded in s...

    SECURITYWEEK
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51315131

    MORE UNSECURE WI-FI AND PHISHING? NOT SO FLASHY

    May 23, 2018

    As more companies embrace the productivity of a mobile workforce, the fact that work is being conducted from potentially unsecured Wi-Fi networks puts enterprise security at risk. According to The 2018 Duo Trusted Access Report, it's not clear that security is keeping pace with the rapid evoluti...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51325132

    SECURITY SHIFTS FOCUS FROM DEFENSE TO RESPONSE

    May 23, 2018

    Despite more organizations feeling that they are getting worse at preventing data breaches, the number of businesses that feel better prepared to respond to incidents is on the rise, according to the latest survey from the not-for-profit industry body the Institute of Information Security Profession...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51335133

    GPON HOME ROUTERS ARE OVER THEMOON BOTNET

    May 23, 2018

    Dasan's gigabit-capable passive optical network (GPON) home routers are again the target of zero-day exploits using a new botnet called TheMoon, according to researchers at Qihoo 360 Netlab. While activity of TheMoon botnet emerged in 2014, it's only been seen adding internet of things (IoT)...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51345134

    LEGIT TOOLS EXPLOITED IN BANK HEISTS

    May 22, 2018

    Cyber criminals attacking the finance and other industry sector are continuing to exploit legitimate administration tools to hide their activities, highlighting the need for threat hunting, a report reveals. Common IT administration tools are being hijacked to act as invisibility cloaks for cyber cr...

    COMPUTER WEEKLY
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51265126

    3.2 MILLION FILES REVEALED ON AWS S3 BUCKET

    May 22, 2018

    A Los Angeles County nonprofit that provides health and human services accidentally exposed about 3.2 million files on an unsecured AWS S3 bucket, according to the UpGuard cyber risk team. 211 LA County, a nonprofit organization serving LA County, was reportedly left publicly exposed online. The con...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51275127

    NEW VARIANTS FOUND IN SPECTRE AND MELTDOWN

    May 22, 2018

    Two new variants of the Meltdown and Spectre vulnerabilities that can allow an attacker to gain access to sensitive information have been disclosed, according to a 21 May US-CERT alert. Google and Microsoft announced that the new variants, 3a and 4, known respectively as Meltdown and Spectre, affect...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51285128

    GEORGIA VOTES IN PRIMARY AMID CYBERSECURITY SUIT

    May 22, 2018

    Despite the continued development of a federal lawsuit regarding the cybersecurity of Georgia's voting machines against Georgia's Secretary of State Brian Kemp and others, today's highly competitive primary race for governor puts a focus on paperless voting machines, according to the Aug...

    INFOSECURITY MAGAZINE
    READ MORE

    http://informationsecurity.report/news-article.aspx?ID=51295129

SPOTLIGHT

This document conveys a process to better understand and predict the cyber workforce needs in federal government agencies through four key components: Cyber Workforce Analysis of the existing cybersecurity workforce. Identification of the required size, skill sets, and functional composition of

RESOURCES

Events