New survey reveals fewer than 5% of UK and U.S Millennials believe their digital identity is completely protected by effective safeguards 70% believe risk to their online privacy will increase as we become more digitally connected 54% claim failure of businesses to implement better online security will result in public distrust of goods and services Leading digital identity expert Intercede released the findings of a new consumer survey that suggests Millennials in the U.S and UK are losing trust in today’s digital economy. Fewer than 5 per cent of respondents believe their digital identity and personal data are completely protected…
Author: ISBuzz Team
To help enterprises navigate and make sense of the increasingly sophisticated cyberthreat landscape, Verizon Enterprise Solutions announced the launch of its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of cyberthreats by harnessing the rich historical breach intelligence gathered by Verizon’s data breach investigations team over the past decade and making it actionable with Splunk security analytics software. Based on near real-time information, the DBIR app for Splunk allows organizations to use Splunk software to gain business insights and operational intelligence using analytics to correlate machine data and network traffic, proactively…
The California State Auditor’s office has issued a new report “High Risk Update—Information Security” which is available Here. The detailed report’s basic conclusion is that “despite the need to safeguard the State’s information systems, our review found that many state entities have weaknesses in their controls over information security. These weaknesses leave some of the State’s sensitive data vulnerable to unauthorized use, disclosure, or disruption.” Jonathan Sander, VP of product strategy for Los Angeles-based Lieberman Software commented on the report that finds sensitive data at risk for at least 73 Callif. agencies. [su_note note_color=”#ffffcc” text_color=”#00000″]Jonathan Sander, VP of product strategy Lieberman…
When tallying up the costs of a data breach, it is easy to focus on the bills that have to be paid. There are significant, tangible expenses: credit cards that need to be re-issued, special PR projects that need to be implemented and the cost of specialized forensic consultants – the list goes on. But, are these the only costs that impact the business? The short answer is no, and here’s why. Some of the most important costs of a data breach don’t easily show up on bills. Significant intangible costs accompany any data breach event, including strategic opportunity costs,…
Following the news of reported suicides in connection with the Ashley Madison breach, comments from Tyler Reguly, manager of Tripwire’s Vulnerability and Exposure Research Team (VERT). [su_note note_color=”#ffffcc” text_color=”#00000″]Tyler Reguly, Manager of Security Research at Tripwire : “The Ashley Madison breach could be considered the ultimate form of cyberbullying. Suicide should not be unexpected in cases where you’ve destroyed someone’s life. In a case like this, where more than 30 million families were potentially destroyed with a single online post, you have to wonder if our current legal system is up to this challenge. Does the intentional release of this…
The Definitive List of the World’s Hottest and Most Innovative Cybersecurity Companies Cybersecurity Ventures has announced the Q3 2015 edition of the Cybersecurity 500, a global compilation of leading companies who provide cybersecurity solutions and services. Cybersecurity 500 is online The Cybersecurity industry is growing from $77 Billion in 2015 to $170+ Billion in 2020, according to consolidated estimates by IT research firms and analysts cited in the Cybersecurity Market Report, published quarterly by Cybersecurity Ventures. There are many new entrants as well as M&A, investment and IPO activity, that is constantly changing the vendor and service provider landscape. The…
Pat Clawson, CEO of the Blancco Technology Group commented in response to a US court’s decision to affirm the Federal Trade Commission’s authority over data security practices. [su_note note_color=”#ffffcc” text_color=”#00000″]Pat Clawson, CEO of the Blancco Technology Group : “I think it’s pretty significant that the FTC is exerting more of its power in matters related to data breaches. At first glance, this seems like a win-win-win for all involved. There’s no doubt it’s a positive thing for consumers whose data is collected, stored and tracked by companies. They can rest assured that businesses will be held accountable for the data…
Avast Builds Threat Detection Based on Machine Learning Avast Software, maker of the world’s most trusted PC and mobile security, is creating a kernel-level mobile security solution. Avast is working with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, to make the new technology available. Qualcomm Technologies developed Qualcomm® SnapdragonTM Smart Protect to detect and classify zero-day and transformed malware in real time using machine learning-based behavioral analysis, to improve privacy protection and device security. Snapdragon Smart Protect is expected to be available in consumer devices in 2016, in conjunction with the Snapdragon 820 processor. “Avast’s experience and leadership in…
Lack of encryption and weak or shared passwords expose sensitive corporate and customer information Centrify Corporation, the leader in securing identities from cyberthreats, announced findings from a recent survey it commissioned to determine penetration and security compliance of Apple devices in the workplace. Conducted by Dimensional Research, the Centrify Apple survey demonstrates that while people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities. Of the total 2,249 US workers surveyed, nearly half (45 per cent) use at least one Apple device for work purposes. In addition : A majority of those…
The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, who have stressed they will not voluntarily co-operate with it. And new research published by IP EXPO Europe, Europe’s number one IT event, reveals that nearly three in five (58%) of UK IT departments fear an increase in business costs as a result of it. Critics have highlighted that rapidly deploying a legislation to ‘spy’ on the general public will cost up to £1.8 billion of taxpayers’ money to implement. But IT professionals face concerns around…