German and Hollywood Hospitals Under Cyber Attack

Hospitals Under Cyber Attack

In response to the news that two hospitals, one in Germany and one in Hollywood have come under attack from ransomware, Kevin Epstein, VP of Advanced Security & Governance at Proofpoint explains what caused the attacks. [su_note note_color=”#ffffcc” text_color=”#00000″]Kevin Epstein, VP of Threat Operations at Proofpoint : “As will be detailed further in Proofpoint’s upcoming […]

DoJ Court Action against Apple

DoJ Court Action against Apple

Security experts from VASCO Data Security, Balabit, and STEALTHbits Technologies have the following comments on DoJ Court action against Apple. [su_note note_color=”#ffffcc” text_color=”#00000″]John Gunn, VP of Communications, VASCO Data Security: The DOJ is accusing Apple of exploiting the issue of backdoors as a Marketing Strategy while they simultaneously promote the idea that every surveille action […]

HSBC Rolls out Biometric Technology

HSBC Rolls out Biometric Technology

You may have seen the recent news that HSBC has launched voice recognition to protect its customers. Security experts from Soitron UK and Ping Identity have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Martin Hummel, Voice Biometrics Consultant, Soitron UK: “Voice biometric security has been with us for a few years now, and while experts […]

Information Managers Face Pressure to Reinvent themselves as Security-Concious Professionals

Security-Concious Professionals

Iron Mountain and AIIM publish report on next generation information management professionals Records and information managers, the traditional guardians of corporate records, face pressure to reinvent themselves as analytical, security-conscious content professionals with an ability to think creatively and manage change, according to a new study by Iron Mountain and global information industry association, AIIM. […]

Top Three Mistakes in Secure Software Development

Secure Software Development

Cyber security has been a key topic at this week’s DeveloperWeek conference in San Francisco. However, according to Tripwire cyber security and software development experts, many software development organizations haven’t fully integrated security into their development process. To aid software development organizations, Tripwire compiled the top three mistakes made during secure software development. According to […]

Why Identity Access and Management is More Important than Ever to Information Security

Why Identity Access and Management is More Important than Ever to Information Security

Why is Identity and Access Management (IAM) important as a business security framework? These days, companies are securing more users who are accessing more applications from more places through more devices than ever before, and all this diversity is putting increasing pressure on identity and access management (IAM) systems. At the same time, security has […]