SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 753

Padlock security

The time for micro-segmentation is now

Mon, 7th Mar 2016
#
micro-segmentation
#
opinion
#
cyber attacks
In the wake of costly breaches, it's whole-system micro-segmentation that is set to redefine cybersecurity this year.
Cloud security

Security: The biggest benefit and challenge of cloud computing

Mon, 7th Mar 2016
#
cybersecurity
#
cloud services
#
mobility
Cloud security is a top concern for many British enterprises, with 31% identifying it as the most prevalent challenge, according to a survey by Clutch.
Cyber hack pattern

The surprisingly scary patterns revealed in hack attacks

Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.
Cyber attack

Healthcare organisations buckle under pressure of cyber attacks

Wed, 2nd Mar 2016
#
malware
#
ddos
#
breach prevention
Healthcare sector unprepared for cyber attacks, averaging one per month, according to ESET and the Ponemon Institute.
Gettyimages 176803549

Point-of-sale malware attacks still strong in 2016

Wed, 2nd Mar 2016
#
malware
#
martech
#
commerce systems
Point-of-sale breaches will continue to be a major issue in the IT world in 2016, according to security firm Carbon Black.
Collab

FireEye and ForeScout enter strategic partnership

Wed, 2nd Mar 2016
#
uc
#
partner programmes
#
breach prevention
FireEye and ForeScout Technologies have partnered to combine advanced threat detection with device visibility for better threat response.
Cybersec

New study shows CISOs not confident in their ability to protect

Wed, 2nd Mar 2016
#
isaca
#
rsa security
#
candidates
Cybersecurity professionals aren't confident in the ability of their teams to protect organisations beyond basic incidents according to a new report.
Stop hand

Centrify ups fight against enterprise attacks with 'MFA Everywhere'

Wed, 2nd Mar 2016
#
mfa
#
iaas
#
iam
Centrify has launched a new initiative to secure enterprise identities against the most prevalent source of cyber attacks - compromised credentials.
Sync and share cloud

Is there a way to sync, share and control data securely?

Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.
Network security

IBM doubles down on security with latest acquisition

Tue, 1st Mar 2016
#
cybersecurity
#
healthtech
#
ibm
IBM Security is set to expand its operations with the acquisition of Resilient Systems, specialists in security incident response solutions.
Byod blue background

Going mobile: How to have secure file-sharing, backup recovery and access

Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
Fbi watching data

Stop bullying Apple around and start doing some intelligence homework

Tue, 1st Mar 2016
#
apple
#
it industry
#
fbi
The FBI should stop bullying Apple and the technology industry and spend their time and energy instead on figuring out other ways of investigating.
Home security

Wireless home security market to reach $32 billion by 2019

Mon, 29th Feb 2016
#
network infrastructure
#
sdn
#
smart home
The emergence of customised solutions and integrated packages will significantly boost the global wireless home security market until 2019.
Eye data drawing

Endpoint data protection: A buyer's checklist

Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Security

No such thing as perfect security, FireEye report finds

Mon, 29th Feb 2016
#
advanced persistent threat protection
#
breach prevention
#
cybersecurity
While disruptive attacks are on the rise, the time between a company being compromised and discovery of the attack is continuing to drop.
Tick

Two Kiwis recognised for cyber resilience work on global stage

Fri, 26th Feb 2016
#
risk & compliance
#
cybersecurity
#
risk management
Marsh brokers become first New Zealanders to receive cyber resilience accreditation from AXELOS. #cybersecurity.
Iphone

Can your iPhone be hacked using just Play-Doh? Yep.

Fri, 26th Feb 2016
#
biometrics
#
apple
#
apple iphone
Touch ID may not be as secure as you thought, with a mobile security company getting around the security with an unlikely partner in crime: Play-Doh.
Order to the chaos

Arbor brings order to the chaos with new security platform

Fri, 26th Feb 2016
#
uc
#
cybersecurity
#
customers
Arbor Networks introduces new security platform to detect and investigate advanced cyber-threats in real-time.
Security sap

SAP security breaches are on the rise, so what's being done about it?

Fri, 26th Feb 2016
#
cybersecurity
#
cloud services
#
sap
SAP cyber threats soar, yet many firms underrate risks, reveals new Ponemon Institute survey, exposing a crucial corporate blind spot.
This is a weird picture

New ServiceNow cloud offerings designed to help security teams

Fri, 26th Feb 2016
#
cybersecurity
#
cloud services
#
servicenow
ServiceNow releases Security Operations, a platform to help IT teams respond to security incidents and vulnerabilities.