Mobile devices are ruling the world. Whether they are being used for consumer or business purposes, we will continue to reach new records over the coming years. According to June 2016 figures from IDC, global shipments are expected to reach 1.84 billion in 2020. With the dependency and plethora of technology devices available, managing mobility across the enterprise is now critical. Employees are able to access company data wherever they are and while companies benefit from improved customer service delivery and business productivity, the rate of adoption leaves areas in the corporate estate vulnerable if not managed correctly. Even with…
Author: ISBuzz Team
There are a raft of things that are now up in the air following the Brexit vote last week. One of the most pressing talking points for businesses is the issue of EU regulations, which may fall away following the Brexit. The new General Data Protection Regulation (GDPR) falls squarely into this bracket. To highlight the data protection angle, security experts commented below. Jason Howells, EMEA Director, MSP Solutions at Barracuda: “To paraphrase Donald Rumsfield: there are known knowns and there are known unknowns. When it comes to Brexit, the principle around the new EU data protection law, the GDPR, falls…
While performing a security assessment for one of its clients in the critical infrastructure sector, the Kaspersky Lab Security Services team discovered an important vulnerability. The CVE-2016-4785 vulnerability could allow an attacker to remotely obtain a limited amount of device memory content from relay protection equipment. The vulnerability was reported to Siemens, the equipment vendor, and has already been patched. The vulnerability was discovered in the network module of a Siemens SIPROTEC 4 protection relay – a device that is widely used in the energy sector to protect the grid against short-circuits or critical power loads. A successful attack through this…
Ask the average computer user how to keep safe and secure online, and ‘strong passwords’ is likely to be one of the first principles mentioned. We’ve all been instructed, at some point or another, to ensure that we use long, complex and various passwords across different online accounts and websites. It is an easy principle to explain to end users. The more complex and unusual your password, the harder it is for a cybercriminal to guess or crack it. Simple, right? The trouble is, the majority of cyberattacks involving compromised passwords don’t involve guessing or cracking at all – they…
Background Based in San Francisco, ServiceSource is a 2,500-employee revenue lifecycle company that provides outsourced customer adoption, expansion and renewal services for subscription-based businesses. Kip James is the company’s Chief Information Security Officer and Data Privacy Officer with 34 years of experience in information technology and 24 years in information security. Challenge Like thousands of companies that migrated to the cloud over the past few years, ServiceSource uses a variety of cloud storage resources and SaaS applications ranging from Box to Google Drive, Gmail, Office 365, Microsoft Office OneDrive and Salesforce.com. In addition, as a public company with many compliance…
Dr. Csaba Krazsnay, Product Manager at Balabit: “I don’t think anyone really knows whether or not Brexit will materially weaken cross-border intelligence sharing on cyber-crime. UK citizens’ decision have to be respected, however from an IT Security point of view, uncertainty is the worst situation that could happen in international relations. There were some good signs of information sharing in cybersecurity in the past few years, but that might be reduced between UK and other EU members. UK, as part of the Five-Eyes countries, had to find the right balance between US relations and EU regulations. Now, this balance is…
With the UK heading to the polls, businesses across the country have raised concerns over leaving the European Union. Richard Lack, director of sales, EMEA, at Gigya commented below. Richard Lack, Director of Sales, EMEA at Gigya: “With the EU Referendum results looming, there have been anxieties over how the UK would form data privacy regulations should we exit the EU and be exempt from the new General Data Protection Regulation (GDPR). However, in the event of a Brexit vote, it would make no sense at all for UK regulations to be any less stringent. Poor safeguards against loss, theft and misuse of…
Joe DiPietro at AlgoSec explores how businesses can improve the IT security/application delivery relationship – by following the example of fast food restaurants. Fast food restaurants are one of modern marketing’s great success stories. With systems honed over decades, the best chains demonstrate remarkably efficient processes, going from customer order to handing over the finished meal in a matter of minutes. Crucially, this automation goes hand in hand with personal, bespoke touches – from the smiling cashier to the option to, as Burger King once announced, ‘have it your way’. No lettice? Extra sauce? No problem. But while Burger King may…
In response to the news that pen testers have discovered mega vulnerabilities in car-hire service Uber which allowed them to identify individual drivers and passengers download their travel history, Lane Thames, Security Research and Software Development Engineer at Tripwire commented below. Lane Thames, Security Research and Software Development Engineer at Tripwire: “Finding multiple vulnerabilities in a product is not surprising. Developing secure software is difficult, even for seasoned programmers who understand security concepts. Unfortunately, our training and educational ecosystem is failing, in general, to properly train and educate technologists about the fundamentals of cybersecurity. The bulk of our human resources…
Researchers have discovered a complex phishing scheme aimed at collecting user credentials from various Bitcoin-related services which under a closer scrutiny led back to a known bulletproof hosting firm. IT Security Experts commented on this research below. David Jevans, Vice President of Mobile Security at Proofpoint: “Bitcoins are largely untraceable and can be transferred to any country and any currency without going through banks which is why hackers are going after them. Stealing bitcoin wallet or exchange passwords is equivalent to stealing cash. Once the bitcoins are sent from the wallet, there is no way to get them back. Victims are sent…