SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 746

Img mmodwyxcn4ue9vftappwywsx

Dell leading the pack in identity management and governance

Mon, 30th May 2016
#
network infrastructure
#
iam
#
cybersecurity
Dell's One Identity Manager has garnered leader status in the latest Forrester Wave for identity management and governance. So who else made the cut?.
New way approach

Anti-virus and anti-malware competition to heat up with new entrant

Sun, 29th May 2016
#
malware
#
endpoint protection
#
ai security
Compared to other areas of security protection, endpoint security hasn't been a hotbed of innovation in recent years. Has all of that just changed?.
Risk

IT pros need to reassess security approach as stakes get higher

Fri, 27th May 2016
#
cybersecurity
#
comptia
IT professionals must reassess their approach to security as cyber threats increase, according to a study by CompTIA.
Isolation jail

New security vendor focused on isolation with Fujitsu deal

Fri, 27th May 2016
#
fujitsu
#
menlo security
#
msip
Menlo Security is an up-and-coming security vendor in Silicon Valley. Its laser focus is on web security. But don't misunderstand this old fashioned.
Data breach

117 million LinkedIn members compromised by 2012 data breach

Tue, 24th May 2016
#
malware
#
cybersecurity
#
linkedin
Over 117 million LinkedIn members' emails and passwords are up for sale, possibly from a 2012 breach. Password reset required.
Risks

Cybersecurity risk-management vital, says expert

Tue, 24th May 2016
#
risk & compliance
#
cybersecurity
#
risk management
Cybersecurity risk-management is not only vitally important to individuals, businesses & governments around the globe - it's very tough to get right.
Iot smart home

IoT Vulnerability: How to protect your smart home from security threats

Tue, 24th May 2016
#
iot
#
wireless networks
#
cloud services
With more than 5 million new devices being connected to the Internet everyday, vulnerability of IoT devices is a trending topic.
Criminal underworld

HPE study delves into the underworld workings of cybercriminal economy

Mon, 23rd May 2016
#
cybersecurity
#
hpe
#
cyber attacks
New Business of Hacking report looks at adversary value chain as driving force in cybercrime and provides actionable insights.
Business it

Organisations are failing to adequately invest in IT security

Thu, 19th May 2016
#
open source
#
cybersecurity
#
red hat
Investment in IT security lags despite a surge in cyber risks, a Red Hat survey reveals, as firms neglect vital defences.
Trojan

Kiwi companies aren't prepared for DDoS attacks

Thu, 19th May 2016
#
ddos
#
vector
#
it professionals
Most Kiwi firms are exposed to crippling DDoS attacks, with over 70% targeted last year and half suffering data theft, reports reveal.
Thinkstockphotos 141115581a

Data-centric security for the Internet of Things

Thu, 19th May 2016
#
data protection
#
data analytics
#
martech
The Internet of Things (IoT) & its dependence on the cloud has created new, critical security challenges in the escalating fight against cyber-crime.
Spam1

Fortinet gains quintuple with 99.9+ score in latest VBSpam tests

Thu, 19th May 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet's FortiMail has scored its fifth consecutive 99.9+ score - and zero false positives - in Virus Bulletin's latest independent VBSpam tests.
Email

Check Point rolls out email protection solution for Office 365 users

Wed, 18th May 2016
#
cloud services
#
email
#
zero day malware
Check Point expands SandBlast Zero-Day protection, preventing latest malware from reaching Microsoft Office 365 email customers.
World

ESET holds ranking in security software market

Wed, 18th May 2016
#
malware
#
cybersecurity
#
analyst report
ESET solidifies its stance, ranked 5th in a stagnating security software market, boasting business segment growth.
Thinkstockphotos 523045690a

Security hole in Symantec antivirus exposes Windows, Linux and Macs

Wed, 18th May 2016
#
endpoint protection
#
edr
#
av
A major security vulnerability has been uncovered by UK white hat hacker and Google Project Zero developer, Tavis Ormandy.
Thinkstockphotos 487418823a

Crowdsourced phishing protection eliminates threats in under 13 minutes

Wed, 18th May 2016
#
phishing
#
email security
#
cybersecurity
IronScales reports that training staff and using crowdsourced phishing protection can eliminate threats in under 13 minutes.
Security

When it comes to wireless networks, security can't be an afterthought

Tue, 17th May 2016
#
wireless networks
#
cybersecurity
#
cloud services
Organisations must prioritise security in wireless network deployment to protect against hackers, according to Wavelink's Ilan Rubin.
Thinkstockphotos 522476560a

Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals

Tue, 17th May 2016
#
cybersecurity
#
opinion
#
flash player
As I write this, if you're running Adobe Flash on your Windows, Mac, Linux or Chrome OS computer you're potentially at risk.
Thinkstockphotos 484016185a

Google suffers minor breach when third-party vendor accidentally exposes employee information

Mon, 16th May 2016
#
data protection
#
breach prevention
#
cybersecurity
Google is one of the latest victims of a minor security breach after confidential information about Google Employees was sent to an outside business.
Thinkstockphotos 481194326a

Frequent password changes crucial to prevent data breaches

Fri, 13th May 2016
#
malware
#
breach prevention
#
cybersecurity
Last week played host to World Password Day and there couldn't be a better time to make sure your passwords are fresh and up-to-date.