As you may have heard, Brazil announced it would block Whatsapp after it failed to comply with legal demands, only for a judge to overturn the decision hours later. Dr Nithin Thomas, Co-Founder and CEO of security start up SQR Systems, comment that how tech companies must manage the balance between security and compliance with the law. [su_note note_color=”#ffffcc” text_color=”#00000″]Dr Nithin Thomas, Founder and CEO of Cybersecurity Firm SQR Systems : “The temporary ban on the use of Whatsapp in Brazil, which has now been lifted, is yet another incident this year of encryption technology getting in the way of…
Author: ISBuzz Team
New app for Tripwire Enterprise improves security, automates compliance and audit documentation for all regulated industries Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, announced the new Whitelist Profiler app for Tripwire® Enterprise. The new app provides audit-ready documentation for all major compliance requirements by providing continuous analysis of essential hardware and software configuration settings, including exceptions and waivers. The Tripwire Whitelist Profiler app enables enterprises to create automated, comprehensive, customizable reports of required or permitted system settings for over 600 policy and platform compliance requirements. Each item in the whitelist is compared against the…
From spear phishing to IoT and malvertising, security threats to plan for in the coming year WatchGuard® Technologies, a leader in multi-function firewalls, revealed its full list of 10 new information security predictions for 2016. WatchGuard’s security research highlights new and emerging threat trends that include: advanced ransomware moving on to alternate platforms; an increase in targeted iOS attacks; and a new hunting ground for criminals to find data that leads to identity theft. [su_note note_color=”#ffffcc” text_color=”#00000″]Corey Nachreiner, Chief Technology Officer at WatchGuard : “The security threat landscape is constantly changing, as cyber criminals deploy old and new methods to…
Netwrix sums up top seven security trends that will drive IT strategy and investment in 2016 While the number of announced data breaches in 2015 is lower compared to 2014, the volume of compromised accounts increased dramatically, exposing more personal data than ever before. With more hidden attacks using advanced techniques to bypass security mechanisms, Netwrix looks at the top IT security trends and technologies to look out for in 2016: Attack surface will continue to grow. Interest in SaaS applications, BYOD, the cloud, IoT devices, wearables and self-driving cars make it hard to reduce all possible vulnerabilities. Hackers will…
Tripwire commented on news that a Bernie Sanders staffer accessed data unique to the Hillary Clinton campaign’s vote file. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : “It sounds like a misconfiguration of the access control between campaigns. There are definitely tools that companies can use to monitor databases for any changes and determine who actually caused the data to be accessible. It’s important to remember that there are four parties involved here: two campaigns, the DNC and a third-party vendor managing the access control. In this case, though there was clearly an issue with…
Hacker group, Phantom Squad, have tweeted threats to bring down Xbox and Playstation this Christmas using Distributed Denial of Service Attacks. The hackers have already claimed responsibility for other outages on the gaming platforms earlier this year, as well as a recent Reddit outage. Tyler Reguly, Manager of Software Development at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tyler Reguly, Manager of Software Development at Tripwire : “DDoS attacks, like the one being threatened by Phantom Squad, are difficult for any service provider to deal with, regardless of their size. While the blame rests clearly on the attackers,…
The Year 2015 has seen organizations disrupting their markets with the digital transformation of their businesses as they embrace 3rd Platform computing and New IP networking strategies that have helped them become leaders in new markets. Moving into 2016, more businesses are expected to leverage smart machines and transformative technologies to give them a clear competitive advantage. As 2015 draws to a close, Marcus Jewell, SVP of EMEA at Brocade looks into the crystal ball to outline the top transformative technology trends in networking to watch for in 2016 and beyond: The cloud will gain even greater traction: According to…
Comments from Pat Clawson, CEO at Blancco Technology Group on potential causes of the breach and the measures that could have been taken to prevent it. Pat Clawson, CEO at Blancco Technology Group : How could this have been prevented? Is there any valid reason for this database not to have been securely erased when JD Wetherspoon moved to a new provider? One thing that’s interesting about this data breach is that the leaked information was housed on a database related to an old version of JD Wetherspoon’s website that’s since been replaced. When a company decides to replace old…
Latest AVG Android™ App Performance & Trends Report finds surge in dating apps usage and outlines Top 10 resource-draining apps Despite its high-profile data breach and very public fallout this summer, the controversial dating app Ashley Madison is bouncing back to pre-hack user numbers, according to the findings of the latest Android App Performance & Trends Report. Compiled on a quarterly basis since Q3 2014, by AVG® Technologies N.V. (NYSE: AVG), the online security company™ for more than 200 million monthly active users, and using anonymous data from over one million AVG Android app users, the report aims to highlight…
In September, CVS/pharmacy finally confirmed that it had been hit by a data breach of the third-party vendor that operates its photo-printing site. This breach, along with similar breaches at Costco Wholesale and Walmart, resulted in the exposure of consumer credit card information. The news, while widely reported, didn’t make the headlines the way the Target and The Home Depot breaches did. Over a relatively short span of time, the way consumers and the media react to these exposures of personal data has changed. Studies show that, despite the incidents of data breaches increasing, most customers make no changes to their behavior or attitudes…