Data is constantly being collected and streamed all around us. From everyday devices like smartphones and televisions, to complex sensors that pick up vital information, the total accumulation of data over the past two years dwarfs the prior record of human civilization, according to Harvard Magazine. Interestingly, however, it’s not the quantity of data that is revolutionary, it’s what we can do with it. The capacity for organisations, businesses and governments to collect, examine and share data is unprecedented, and can generate new insights that have the potential to change the world. Saving lives is just one example of how…
Author: ISBuzz Team
To help businesses and government better secure products as they are distributed, Xerox introduced two printed electronic labels (also known as “printed memory”) that can collect and store information about the authenticity and condition of products. Xerox Printed Memory is a highly secure, printed label containing up to 36 bits of rewritable memory which can store up to 68 billion points of data. The labels, for example, can be used to determine if a product is genuine and to track how it’s been handled during distribution. The second product, Xerox Printed Memory with Cryptographic Security includes a unique, encrypted printed code (such…
The past few years have seen a steady increase in major hacking incidents, with high-profile breaches at corporations like Target, Sony Pictures and Home Depot as well as the US government making headlines worldwide. These breaches compromised consumer credit and bank account information, personal correspondence and data such as Social Security numbers. Big companies aren’t the only victims — hacking is on the rise at small and mid-sized companies too, and consumer identity theft is a global problem. But why is this crisis reaching a boiling point now? Here are three factors behind the increase in data theft : Companies…
Ponemon Institute founder to present new findings on the cost of a data breach and economic impact of continuous security training Wombat Security Technologies (Wombat) announced that the company will host its inaugural user community meeting, called “Wombat Wisdom,” on September 28-30. Dr. Larry Ponemon, chairman and founder of Ponemon Institute, will deliver the keynote address to present new findings from a new research report on the Cost of Phishing and Value of Employee Training, which found that employee training significantly reduces the financial consequences of phishing in the workplace. The “Wombat Wisdom” event, appropriately named as a group of…
68 percent of security professionals prefer candidate with strong cybersecurity policy Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced the results of a survey of 210 information security professionals conducted in August 2015. As the number and scale of data breaches continue to grow, cybersecurity issues are becoming part of our national discourse. The topic is already a key issue for the 2016 presidential campaign, and voters can expect more cybersecurity policy discussions in the upcoming presidential debates. According to Tripwire’s survey, more than two-thirds (68 percent) of information security professionals would prefer…
One in three IT decision makers have to fight for stricter security protocols IT decision makers in UK companies say they are more likely to hear about free food in the conference room, staff birthdays and even kitchen etiquette in the office than about security protocols in their business. This is according to figures from the ‘State of the Corporate Perimeter’ report from Centrify Corporation, the leader in securing identities from cyberthreats. A survey of 400 IT decision makers (ITDMs) – 200 in the UK and 200 in the US – the report looks at whether organisations are as secure as they should be. With changing…
Security experts from VASCO Data Security and Lastline commented on the on news the discovery of the first multi-vendor ATM malware targeting cardholders. [su_note note_color=”#ffffcc” text_color=”#00000″]John Gunn, VP of Communications, VASCO Data Security : “Innovative financial institutions are already starting to integrate their mobile application into the ATM process to improve convenience and enhance security. When you can no longer access funds, or perhaps just a limited amount, without your mobile phone physically present at the ATM, then these types of attacks will become far less rewarding to hackers.”[/su_note] [su_note note_color=”#ffffcc” text_color=”#00000″]Giovanni Vigna, CTO of Lastline : “For card users, the best protection…
The number of new security threats and issues tied to trends such as mobile access, Bring Your Own Device (BYOD) and collaboration seem to be in the news every other week – and likely will not have gone by unnoticed. It’s no longer standard practice that organisations operate in one geographic location or use one dedicated bank of servers; global collaboration is a regular part of any business. Despite the huge benefits of this worldwide connectivity, an unfortunate result is that increased numbers of access points are vulnerable to cybercriminals or data leaks, therefore creating a greater security challenge. Businesses…
A key aspect of the company’s growth strategy for services and solutions includes a new software-based release of Unisys Stealth that delivers micro-segmentation for more effective protection Unisys Corporation (NYSE: UIS) announced a range of advanced security products and solutions, including a new software-based release of its award-winning Unisys Stealth™ solution, which helps organisations protect their digital and physical assets in cloud, mobile and enterprise environments. The new security products and solutions, a key part of the company’s growth strategy, were unveiled at its annual Americas Analyst and Advisor Summit in Dallas. Designed to protect vital information and infrastructure in the…
Databarracks launches 2015 Data Health Check report New research by Databarracks has revealed that just 27 per cent of small businesses have a business continuity plan (BCP) in place, compared to 68 per cent of medium organisations and 75 per cent of large organisations. Worse still is that 73 per cent of the small businesses questioned admitted they hadn’t tested their BCP in the last 12 months, with nearly half not planning to within the next year. The findings are part of Databarracks’ sixth annual Data Health Check report, released. The survey questioned over 400 IT decision makers in the UK to find…