Profiles show mix of graduates, professionals and cyber-enthusiasts amongst UK’s top cyber talent Students keen to hear from employers looking to bring world-class cyber expertise on board The SANS Institute, the world’s largest and most trusted source of information security training, has announced the profiles of its final 32 Cyber Academy students – a mix of recent graduates, cyber enthusiasts, military-leavers and professionals – who are preparing to undertake an intense eight weeks of cyber training at the first ever SANS Cyber Academy. The inaugural Academy cohort is made up of seven recent graduates, 21 people who have begun working…
Author: ISBuzz Team
Product Innovation and Global Growth Cap Successful Second Quarter Datto, innovative provider of comprehensive data backup, recovery and business continuity solutions, has announced the company achieved rapid growth in the second quarter of 2015. Datto introduced new products, held its first-ever EMEA Partner Conference and expanded its distribution further into the UK, Ireland and Europe. Driven by an uptick in international growth, Datto experienced its best Q2 to date in terms of revenue, with a 57 percent increase from Q2 2014. Product updates and partner conference Before an audience of more than 100 partners at Datto’s EMEA Partner Conference in…
Matt Newing, CEO at Elitetele.com commented on the latest news that hackers are threatening to expose millions of Ashley Madison users in a massive data breach at the cheating website. [su_note note_color=”#ffffcc” text_color=”#00000″]Matt Newing, CEO at Elitetele.com Consumer trust in a business has never been so critical. Hackers publishing the details of 37 million Ashley Madison users has left patrons exposed and the businesses reputation in tatters. The reports that 9.7 gigabytes of data has been posted, including member’s account and credit card details, demonstrates the need for customers to feel confident that their financial and sensitive details are safe…
Tripwire Survey Examines Views of 270 Information Security Professionals at Annual Information Security Conference Tripwire, Inc., a leading global provider of advanced threat, security and compliance management solutions, announced the results of a survey of over 270 attendees at Infosecurity Europe 2015 in Olympia, London in the United Kingdom. Research firm IDC anticipates there will be over 28 billion Internet of Things (IoT) devices installed by 2020. These devices are expected to deliver an overall global economic value add of $1.9 trillion, of which 80 percent will be derived from services. While the IoT marketplace is lucrative, new devices will…
Microsoft has issued an emergency patch for Internet Explorer outside of its Patch Tuesday Monthly schedule following a zero-day vulnerability, dubbed CVE-2015-2502. The vulnerability could allow an attacker to hijack control of your computer via Internet Explorer – just by you visiting a boobytrapped webpage. Lane Thames, Software Development Engineer and Security Researcher at Tripwire gives insight into the vulnerability. [su_note note_color=”#ffffcc” text_color=”#00000″]Lane Thames, Software Development Engineer and Security Researcher at Tripwire “Microsoft has released MS15-093, which is an emergency out-of-band (OOB) patch for Internet Explorer (IE). The MS15-093 security update addresses a memory corruption vulnerability (CVE-2015-2502) within IE7 through IE11 that…
You should never have one password for all your accounts. Yet you probably recycle some passwords more than is recommended. If hackers get their hands on your email password, they can systematically change the passwords of your other accounts. Instead, use many different, randomly generated passwords. This can decrease your risk, though not eliminate it completely. For a closer look at online protection, here are some hacking horror stories. Email Hack Email hacks are one of the most common tactics used to gain access to your personal information, as well as that of your friends and family. Once having gained…
Change Tracker Gen 7 marks the next generation of continuous breach prevention with intelligent file integrity monitoring and security configuration management powered by Closed-Loop Intelligent Change Control New Net Technologies, (NNT), a global provider of data security and compliance software solutions, announces the availability of the next generation of NNT Change Tracker™, its flagship system auditing and change detection solution. Change Tracker™ Gen 7 heralds a new ‘Intelligent’ approach to system integrity monitoring technology, making it more effective for real-time breach detection and more usable, empowering IT to maintain Security Best Practices. Through Closed-Loop Intelligent Change Control (CLICC) functionality, Change…
In light of the increasing volume and sophistication of cyber threats, organizations needs to identify their relevant risk, determine their cybersecurity posture and act upon it. That much is clear, but it is easier said than done. Organizations needs not only an agreed methodology to work by, but also a tool to help them achieve that goal and properly assess their threat landscape, control maturity and better prepare for the upcoming threats. The FFIEC (Federal Financial Institutions Examination Council) has developed a Cybersecurity Assessment Tool, which was released on June 2015. The Assessment presents a new and innovative view on…
Fraudsters exploit any site that offers opening a vendor account Fraudsters are continually coming up with new and interesting ways to steal money from innocent victims, which doesn’t really come as much of a surprise, does it? There’s already a wide range of methods in place that are tried and proven. For example, a fraudster might use a social engineering scam to trick a victim’s family and friends into wiring cash to a bank account supposedly on the victim’s behalf, not knowing that cash is going straight into the hacker’s pocket. Or, a hacker might use a phishing attack to…
Properly managing data should be a top priority for businesses of any size. Information is the cornerstone of most businesses, whether it’s data about a patent or groundbreaking new product or the personal files of tens of thousands of customers. And it’s not just documents or Excel files that are vital. A company might have photo or video content from a recent tradeshow or an engaging showcase about a new product. In either case, the data is valuable and deserves attention and protection. Since most data is now digital, companies have to protect and properly manage this information in order…