As security breaches are becoming almost commonplace in the finance, retail, healthcare, and entertainment industries, many CISOs are asking the question: How vulnerable is my IT infrastructure? With large enterprises that have been victims of security breaches making news headlines every day, we can agree that traditional signature-based endpoint protection solutions are no longer sufficient to protect against increasing advanced persistent threats (APTs) and Zero-Day attacks. How can CISOs reinforce their security measures? The answer lies in implementing IT analytics solutions that can detect abnormal activity and behaviour in enterprise IT environments that can leverage a combination of real-time visibility…
Author: ISBuzz Team
A secure and productive mobility strategy is a game changer for any business in today’s connected world. It’s becoming more imperative for users to gain access to corporate data on their mobile devices both inside and outside of the corporate network. Mobile workflows can be faster and more intuitive than those on desktop computers, but enterprises need to be cautious before allowing the widespread use of sensitive business information on unsecured mobile devices. In many cases, unfortunately, that means user productivity is overlooked in IT’s pursuit for data security. Fortunately, businesses are no longer required to sacrifice usability for security.…
BalaBit announces general availability of Blindspotter; advanced monitoring to identify suspicious user activity BalaBit, an IT security innovator specialising in advanced user monitoring technologies, today announced that its next-generation IT security tool, Blindspotter, is now generally available. Blindspotter is a real-time, user behaviour analytics (UBA) tool that analyses user activities and identifies suspicious events occurring throughout IT systems. It is designed to help organisations mitigate the impact of advanced persistent threats (APTs) or identify malicious internal activity and to speed up the investigation process of any suspicious activity. Blindspotter tracks and visualises user activity in real-time to provide organisations with…
Reflecting on this morning’s computer problems that grounded flights on United, halted trading on the NYSE, and took The Wall Street Journal website offline for a short period, cybersecurity experts commented : Jonathan Sander, Strategy & Research Officer at STEALTHbits Technologies (www.stealthbits.com): “United Airlines and NYSE both made strong statements via Twitter that their outages were not security related. There’s no reason to doubt them. But what does it say that this is the first thing everyone assumes? If you went to a clothing store on Main Street and there was a “we’ll be back” later sign in the window,…
Following the news that Microsoft has unveiled a feature in Windows 10 called WiFi Sense, which enables users to share access to WiFi networks that require a password with all their contacts – in Skype, Outlook and Facebook, Comments from security experts Imperva and ESET which discuss the potential security concerns with the feature: Amichai Shulman, CTO of Imperva : “Without getting into how secure the implementation is and whether an attacker can get hold of cleartext WiFi password or not, this is a perfect example of how convenience makes us vulnerable. It is clear that this type of feature allows our…
Bring Your Own Encryption (BYOE) Lets Users Define, Inject Personalized Software Encryption Enabling Fully Secured Containment of Their Data Even When the Cloud Is Hacked. Secure Channels Inc., the Technology Innovators™, today announced Bring Your Own Encryption (BYOE), which allows users to individualize and “personalize” data to prevent back door access and data mining by any non-legal third party. BYOE enables the customer to control and own encryption keys which personalizes their data with orders of magnitude more secure than all known commercial encryption methods leaving them free from relying on highly targeted and vulnerable 3rdparty providers. BYOE fills crucial…
The U.S. government is still reeling from the massive cyber attack that targeted the Office of Personnel Management (OPM) in June. And with good reason – thus far, the breach is deemed the worst attack on government networks in U.S. history. Reports have emerged that the breach is possibly four times larger than officials originally presumed, placing estimated losses at upwards of 18 million records, according to FBI officials. And that number might grow, due to the fact that hackers infiltrated a database that contained highly private information on family members and associates of those whose records were hacked. While…
Like watching a yoga expert balance on their head, being agile might look simple to the untrained eye. However, if you try to achieve that move gracefully for the first time, without the necessary preparation, you are sure to fall flat on your face. There are certainly a few IT professionals that have suffered this fate after assuming that following an Agile philosophy would be easy. Far from it. In order to do Agile, you need to be Agile, which can only be achieved by a change in mind set and cultural approach that spans the entire organisation – not…
By definition, drones are unmanned aerial vehicles. A drone can be controlled remotely by an operator or installed with an automated function. While their popularity in the civilian population has soared only recently, drones have been around for decades. In fact, one of the earliest drones was used by the U.S. in Vietnam. Currently, the government continues to employ drones to carry out surveillance and to fight terrorism. The use of drones is not restricted to the military. Businesses are looking to drones for advantages to rise above their competition. Amazon is one of the pioneers in this niche with…
The Wordpress is a CMS specialized in blogging that is widely used in the world. It happens because it has one of the most easier installation processes and also has various types of plugins and themes (for free and payable) that allows the full personalization of the appearance and functionality of the web pages. The day-by-day of writing articles, spend so much time, and unfortunately the procrastination and/or laziness make us forget to do the periodical maintenance of the application (security hardening and version update) that makes our site weak or helpless to prevent attacks of crackers (resulting in an…