Cyber Attack on the Ukrainian Power Grid

Cyber Attack on the Ukrainian Power Grid

The CIA is looking into whether Russian Hackers were to blame for the cyber attack on the Ukrainian power grid.  Experts say this is a first of a kind and may be a bad omen for attacks on other power grids around the world including our own. Tim Erlin, director of security and product management at Tripwire […]

Drupal Users are at Risk of Cyber Attacks

Drupal Users are at Risk of Cyber Attacks

You may have seen news that potentially millions of Drupal users are at risk of cyber attacks after issues with the Drupal update process have mean that its installations could be out of data and listing unpatched platforms as current. John Smith, principal solution architect at Veracode have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]John […]

FTC Puts Spotlight on Encryption

FTC Puts Spotlight on Encryption

Data security expert Mark Bower commented on yesterday’s announcement by The Federal Trade Commission (FTC)  that dental software provider Henry Schein Practice Solutions has agreed to settle with the FTC over charges it misled customers on the level of encryption its software provided to protect sensitive patient data. Mark Bower, Global Director Product Management for […]

Social Network Sharing Makes Users an Easy Target for Cyber-Criminals

Social Network Sharing Makes Users an Easy Target for Cyber-Criminals

A Quiz from Kaspersky Lab has found that almost a third (30 per cent) of social network users share their posts, check-ins and other personal information, not just with their friends, but with everybody who is online. This is leaving the door wide open for cyber-criminals to attack, as users remain unaware of just how […]

Five Security-Related New Year’s Resolutions

Five Security-Related New Year's Resolutions

Will 2016 be the year that businesses finally stop being their own worst enemies when it comes to data security? In 2015, incident after incident demonstrated that management and IT staff are largely oblivious to bad employee practices, such as the use of unsanctioned, consumer-grade file sharing apps. And, if they are aware of the […]

Next Generation Network Monitoring & Security Applications

Next Generation Network Monitoring & Security Applications

Breakthrough ANIC-40Ku Delivers Unprecedented Scalability, Real-Time Actionable Flow Classification, Fast Lookup Table & More Accolade, the technology leader in high performance FPGA based packet capture and application acceleration adapters/NICs, today introduced the ANIC-40Ku, the market’s most advanced, quad 10GbE application acceleration network adapter/NIC. The ANIC-40Ku leverages Xilinx’s State of Art Ultrascale technology to offer the […]

Top Information Security Threats for 2016

Top Information Security Threats for 2016

As 2016 kicks off, leading cloud security company iSheriff has forecast the top five security threats that businesses will face in the next 12 months. While some of these trends started in 2015 and are expected to continue, others will bring newchallenges for security professionals. More POS device breaches.  In 2016, we can expect more […]