Despite priority placed on cybersecurity, companies still have significant room to improve existing practices At a time when cybersecurity breaches are becoming more frequent and significant, organisations are continuing to place a high priority on improving their cybersecurity frameworks. However, despite improvement in many areas, one in three companies still lacks policies for its information security, data encryption and data classification, according to The Battle Continues – Working to Bridge the Data Security Chasm: Assessing the Results of Protiviti 2015 IT Security and Privacy Survey from global consulting firm Protiviti. “Cyber security is not solely a technology problem. The survey…
Author: ISBuzz Team
Cloud Employee founder and CEO, Nick Hargreaves, believes that looking to nations with high educational standards and large numbers of IT and engineering graduates – such as the Philippines – could be the answer to the UK’s skills shortage. [su_note note_color=”#ffffcc” text_color=”#00000″]Nick Hargreaves, founder and CEO at Cloud Employee : “Finding suitably skilled candidates in the UK is incredibly difficult for British companies at the moment, and the findings of the Global Skills Index come as no surprise. June’s Report On Jobs from the Recruitment and Employment Confederation (REC) found that IT professionals were the fourth most sought-after profession in…
Bill Platt, at BMC commented on how digital enterprises such as Facebook can respond to such outages, to keep customers and indeed, shareholders on side. [su_note note_color=”#ffffcc” text_color=”#00000″]Bill Platt, SVP & Chief Architect at BMC : This week’s Facebook outage reinforced what we learned from the AWS outage last week: every high profile internet outage comes at a cost. Facebook and similar digital services have set incredibly high uptime expectations with their users, and interruptions draw these users’ instant wrath. Today’s always-on digital enterprises require always-ready IT and always-on performance. Whenever a major global player (like Facebook) is plagued by down-time,…
In what is likely to be a short-lived cessation in Dridex campaigns while the criminal proponents behind that malware scramble to find a new delivery channel, it appears as though other malware purveyors may be positioning themselves to take additional market share of the lucrative crimeware arena. One recent development saw Vawtrak, previously a second-tier banking and information stealing trojan, emerge with new capabilities — most notably new methods for data encoding and changes to C2 communication that appear to be an attempt to improve on the malware’s detection evasion. Part I : Attack Vectors and Infiltration Before it can…
Businesses today thrive on connectivity. However, easily/remotely accessible networks come with numerous well-documented security risks, particularly from malicious cyber attacks. With one data security breach an organisation can suffer significant damage to both finances and reputation. As such, most quite rightly put numerous security layers in place to protect their network perimeter from external threats. The insider threat, however, is more difficult to defend against. In their recent survey the SANS Institute highlighted that security professionals identify the insider threat as a key concern. However, out of the 770 businesses that took part in the study 32% had no security…
Advanced threat protection leader expands its easy-to-deploy next-generation cybersecurity platform for small and medium enterprises Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation cybersecurity company, announced the latest version of Proofpoint Essentials™ to protect how small and medium enterprises work today. Today’s release features policy-based email encryption, protection against threats on corporate social media accounts and defense against attachment-based advanced threats. According to Proofpoint research, on average, a 150-employee company suffers a targeted attack once a month. The FBI’s Criminal Investigative Division also recently indicated that cybercriminals use publicly available information and vulnerabilities in email systems to trick small businesses into…
Report Offers a Detailed Look at How a Consumer Banking Trojan Can Infect a Company Imperva, Inc. (NYSE:IMPV) committed to protecting business-critical data and applications in the cloud and on-premises, unveiled its latest Hacker Intelligence Initiative (HII) Report: “Phishing Trip to Brazil.” This new report, published by the Imperva Application Defense Center (ADC), offers a detailed look at a cyber attack targeting consumers using a banking Trojan, and shows how consumer-centric cyber crimes can compromise the enterprise. The report also demonstrates that despite potential anti-malware defenses, attacks that target individual employees can easily enter the enterprise network. To conduct this report, the…
Expert System text analytics scales rapidly on Google Cloud Platform by enabling developers and organizations to take advantage of unique cognitive computing features through an easy API call. Expert System (EXSY.MI), the leader in multilingual cognitive computing technology for the effective management of unstructured information, announced that its Cogito API is available on Google Cloud Launcher, which allows developers and organizations to launch selected software packages on Google Compute Engine in just a few clicks. As one of the first Google Cloud Platform technology partners listed on Google Cloud Launcher, Expert System extends the unique semantic advantages of its Cogito technology for natural language processing, text…
Network behavioural analysis – a systematic, architectural approach to network security – involves deep packet analysis to identify advanced persistent threats (APTs) and zero-day attacks. Similar analytical capabilities are used by the financial and banking sectors to spot fraudulent transactions and card activity. From an IT perspective, the sophisticated cyber attacks that have plagued Apple, Facebook and Microsoft (with the goal of carrying out industrial espionage) have been detected through behavioural analytics. Cyber attacks are continuing to evolve, there is no doubt about that, and cybercriminals are becoming extremely effective at successfully evading traditional detection methods. This is why many forward-thinking organisations are…
The recent news about the Canadian election candidate not knowing about Auschwitz, apart from her apparent ignorance, highlighted an issue that those of us involved in IT security keep talking about – privacy. The Canadian made some potentially offensive comments on her Facebook profile years ago, yet they remained there, visible to any snooping eyes that would bother to click through her Facebook wall history and came back to haunt her when running for office now. In 2009 UK saw a scandal involving the chief of MI6 secret service having his cover blown, as his wife revealed details of their…