home.aspx

 
. home.aspx home.aspx

ARCHIVED NEWS


    NCSC URGES ACTION AFTER DIXONS CARPHONE BREACH

    Jun 14, 2018

    The National Cyber Security Centre (NCSC) is urging UK business to improve data protection capabilities after Dixons Carphone revealed that millions of payment card and personal data records may have been compromised in a cyber breach. The National Crime Agency (NCA) is leading the UK law enforcemen...

    COMPUTER WEEKLY
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51875187

    CRYPTO-MINING MALWARE TOPS CHARTS, TARGETS APPS

    Jun 13, 2018

    For organizations that were hoping to see a decline in malware threats, there is no sign that crypto-mining malware will be going away anytime soon. In fact, crypto-mining malware continues to dominate among hackers while also sneaking its way into more mobile apps. According to Check Point’s ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51845184

    NEXT-GEN CYBERSECURITY FOR TRUCKING

    Jun 13, 2018

    The transportation industry is midway through the CALSTART 2018 Cyber Truck Challenge, and Heavy Duty Trucking (HDT) has announced that the University of Tulsa (TU) is working to develop a truck cybersecurity device. Cyber Truck Challenge, established to help develop the next generation of the truck...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51855185

    EMAIL THREATS INCREASE, IMPACT PRODUCTIVITY

    Jun 13, 2018

    Whether its ransomware or phishing attempts, email threats are a top risk to organizations' security. According to new data from Dimensional Research and Barracuda Networks, email threats are rising and remain a top concern for businesses. More than 600 executives, individual contributors and IT...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51865186

    ADOBE ZERO-DAY FIX PRECEDES JUNE PATCH TUESDAY

    Jun 12, 2018

    Adobe closed a zero-day vulnerability last week, which Microsoft added to its June Patch Tuesday updates. Administrators have a lighter workload with about 50 exploits to address. Adobe closed a zero-day vulnerability last week, which Microsoft added to its June Patch Tuesday updates. Administrators...

    TECHTARGET
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51795179

    NON-JAVASCRIPT CRYPTOJACKING REAPS MORE THAN $144M, RESEARCHER FINDS

    Jun 12, 2018

    Cryptojacking attacks are finding success and have now gained the attention of the U.S Federal Trade Commission (FTC). Unauthorized crypto-currency mining, commonly referred to as cryptojacking, is a problem that doesn't seem to be slowing down and continues to be challenge for enterprises and i...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51805180

    HYBRID CLOUD SECURITY ARCHITECTURE REQUIRES RETHINKING

    Jun 12, 2018

    Enterprises need a centralized approach when considering a hybrid cloud security architecture, an analyst says. Plus, is user experience management an IT responsibility? Cloud security isn't for the squeamish. Protecting cloud-based workloads and designing a hybrid cloud security architecture ha...

    TECHTARGET
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51815181

    IBM ANNOUNCES MAJOR EXPANSION OF REGIONAL CLOUD SERVICES

    Jun 12, 2018

    Clients also will be able to deploy multizone Kubernetes clusters across the availability zones via the IBM Cloud Kubernetes Service. BM, which hardly wants to see AWS continue to control 35 percent of the cloud services market and fast-growing Microsoft Azure surpass the 10 percent mark, has announ...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51825182

    MOBILE APP SECURITY RISKY ACROSS SECTORS

    Jun 12, 2018

    While mobile app security is an issue across all sectors, 50% of apps that come from media and entertainment businesses are putting users at risk. New research from BitSight found that a significant percentage of mobile apps across multiple industries have high-severity vulnerabilities. “Mobil...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51835183

    UNTANGLE UPDATES NG FIREWALL TO IMPROVE SD-WAN SECURITY

    Jun 11, 2018

    A new release of Untangle's firewall platform benefits from a shift to a newer version of the Debian Linux operating system as the base. Untangle will announce version 14.0 of its NG Firewall platform on June 12, providing new features that enhance the security capabilities of the Linux-based pl...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51755175

    SENATORS PUSH ELECTION SECURITY IN DEFENSE BILL

    Jun 11, 2018

    In an attempt to expedite legislation to secure US election systems, senators have introduced a new version of the Secure Elections Act as an amendment to the National Defense Authorization Act (NDAA). With discussions of the NDAA reportedly on next week's agenda, Sens. James Lankford (R-Olka.) ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51775177

    INVESTORS BACK INDUSTRIAL CONTROLS WITH $60 MILLION

    Jun 11, 2018

    A collective group of stakeholders invested $60m in a Series B funding round for Claroty, a cybersecurity software provider for industrial control networks. With the backing of the collective group, the company's total investment climbed to $93m, making the round unprecedented. Underscoring the ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=51785178

TRENDING NEWS


    CISOS HAVE LIMITED CORPORATE INFLUENCE, ACCENTURE REPORTS

    Jul 12, 2018

    An Accenture study reveals that chief information security officers are lacking authority and visibility to effect change within their organizations. Chief information security officers are responsible for developing and establishing cyber-security strategies and policies with their organizations. Y...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52645264

    CRITICAL BUG BOUNTY REPORTS ON THE RISE, HACKERONE FINDS

    Jul 12, 2018

    The 2018 Hacker-Powered Security report reveals that there has been an increasing volume of critical security vulnerabilities reported by researchers in the past year. HackerOne released its 2018 Hacker-Powered Security Report on July 11, providing insights into the current state of the bug bounty m...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52655265

    FEMALE CERTIFIED SECURITY PROS STILL EARN 8% LESS

    Jul 12, 2018

    A new study out this week from InfoSec Institute found that female certified cybersecurity practitioners earn as much as 18% less than their male counterparts. "While the data showed the gender pay gap in cybersecurity (-8%) is lower than the national average for all industries, this gap magnif...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52665266

    WINDOWS MALWARE CARRIES VALID DIGITAL SIGNATURES

    Jul 12, 2018

    Researchers from Masaryk University in the Czech Republic and Maryland Cybersecurity Center (MCC) monitored suspicious organizations and identified four that sold Microsoft Authenticode certificates to anonymous buyers. The same research team also collected a trove of Windows-targeted malware carryi...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52675267

    IBM PEGS MEGA BREACH COST AT $350M, AS AVERAGE BREACH COST HITS $3.9M

    Jul 11, 2018

    The 2018 Cost of a Data Breach Study found that costs have risen in the past year as attacks become increasingly complex. The cost of data breaches has increased over the past year, according to the 2018 Cost of a Data Breach Study conducted by the Ponemon Institute and sponsored by IBM, which was r...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52605260

    TRAVEL INFORMATION LEAKED AT THOMAS COOK AIRLINES

    Jul 11, 2018

    A bug finder recently discovered that Thomas Cook Airlines had a security vulnerability for years, making it possible for hackers to systematically download hundreds of thousands of passenger flight details and personal data going back as far as 2013. The issue, rated a medium to high severity level...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52615261

    STARTUP HOPZERO LAUNCHES DISTANCE-BASED PACKET SECURITY SERVICE

    Jul 11, 2018

    Designed to thwart cyber-security breaches in large enterprise data centers, Hopzero provides a new layer of security protection to complement access-based security solutions. Most IT people don’t know anything about this, but there is yet another way to approach enterprise security outside of...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52625262

    DHS, SECURELOGIX DEVELOP TDOS ATTACK DEFENSE

    Jul 11, 2018

    The U.S. Department of Homeland Security and vendor SecureLogix are making 'rapid progress' in developing a TDoS attack defense. The technology is expected in the coming months. The U.S. Department of Homeland Security has partnered with security firm SecureLogix to develop technology to def...

    TECHTARGET
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52635263

    AT&T ACQUIRES ALIENVAULT, MIMECAST GRABS ATAATA

    Jul 10, 2018

    In an effort to expand its security solutions to small and medium-sized businesses (SMBs), global communications, media and entertainment and technology company AT&T has announced that it will acquire California-based security solutions company AlienVault. Combining AlienVault's threat intel...

    INFOSECURITY MAGAZINE
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52565256

    RANSOMWARE ATTACKS SPIKED IN FIRST HALF OF 2018, SONICWALL REPORTS

    Jul 10, 2018

    SonicWall's mid-year 2018 cyber-threat report reveals that there has been a 229 percent increase in ransomware attacks so far this year. The first half of 2018 has seen a resurgence in ransomware attacks, according to SonicWall's mid-year 2018 cyber-threat report released on July 10. For the...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52575257

    CENTRIFY SETS OUT ON NEW COURSE WITH SINGLE FINANCIAL BACKER

    Jul 10, 2018

    Company converges identity-as-a-service and privileged identity solutions into a unified Next-Gen Access platform for Zero Trust Security. Centrify, an established star in the enterprise security software business and the technology behind Samsung’s on-device Knox identity and access managemen...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52585258

    APPLE RELEASES MACOS 10.13.6 AND IOS 11.4.1 SECURITY UPDATES

    Jul 10, 2018

    Apple improves iOS security with USB Restricted Mode and hardens macOS against a new class of meltdown and spectre CPU vulnerabilities. Apple released a series of updates for its desktop and mobile operating systems on July 9, providing users with multiple updates for security issues. Among the upda...

    EWEEK
    READ MORE

    https://informationsecurity.report/news-article.aspx?ID=52595259

SPOTLIGHT

Governments learn slowly from knowledge, study, and experience, and learning occurs internationally when new knowledge gradually redefines the content of national interests and leads to new policies.3 For example, the United States and the Soviet Union took decades to learn how to adapt and respond

RESOURCES

Events