Connected Car Security Board

Connected Car Security Board

Establishes Automotive Security Review Board;Unveils Automotive Cybersecurity Best Practices To help mitigate cybersecurity risks associated with connected automobiles while encouraging technological progression and innovation, Intel Corporation today announced the establishment of the Automotive Security Review Board (ASRB). The board will encompass top security industry talent across the globe with particular areas of expertise in cyber-physical […]

Extending DLP Frameworks to the Cloud With New Reference Architecture

DLP Frameworks to the Cloud With New Reference Architecture

Framework will enable more accurate data loss prevention; facilitate better integration with on-premises systems Netskope, the leading cloud access security broker, announced a new reference architecture for data loss prevention (DLP) in the cloud, a framework designed to help organisations more accurately find sensitive content in the cloud and integrate more efficiently with on-premises DLP […]

Cal State Uni Data Breach Hits Nearly 80,000 Students

Data Breach Hits Nearly 80,000 Students

The Los Angeles Times is reporting that a data breach at eight California State campuses exposed the personal information of nearly 80,000 students enrolled in an online sexual violence prevention course. Cyber security experts at Tripwire have verified with the hired vendor We End Violence that the passwords stored in these systems were not encrypted […]

Excellus BlueCross Hacked, Over 10 Million Records at Risk

Excellus BlueCross Hacked

Security experts from VASCO, Spikes Security and STEALTHbits commented on the latest hack of health insurer excellus that may have exposed 10M personal records. [su_note note_color=”#ffffcc” text_color=”#00000″]John Gunn, VP of Communications, VASCO Data Security International : “It is simple economics – hackers are attacking targets with highest value assets; retailers for payment cards, banks for […]

AWS Security : What You Need to Know

Examines some of the key security features of Amazon Web Services and provides tips on best practice If you’re considering migrating your business applications to a public cloud, the chances are that you’ve looked into Amazon Web Services. With its higher capacity and wide range of cloud services, AWS has become the most popular choice […]

Ten Different and Very Real Cyber Attack Methods

Real Cyber Attack Methods

The study of real-word events helps illustrates the different types of cyberattack and how to deflect them In series of case studies published, global information security consultancy, MWR InfoSecurity, has revealed the characteristics of ten different cyber attack. Each paper, produced with the support of the UK’s Centre for the Protection of National Infrastructure, aims to […]

Choosing a CSP is About More than Just Security

CSP is About More than Just Security

Providers have to go extra mile to demonstrate cloud credentials Security has traditionally been the deciding factor for a lot of organisations when it comes to selecting a cloud service provider, but as cloud services have matured, so have the demands of the user. Research from the Cloud Industry Forum (CIF) has shown that cloud […]