Earlier this year Lloyd’s of London reported a remarkable figure that the cyber insurance market grew by 50% in Q1. Despite this growth, the Corporate Executive Programme (CEP), found that 40% of major US companies have cyber insurance cover compared to 13% of UK businesses. While this is encouraging, it begs the question: are companies starting to look for an easy way out of transferring their cyber risks or are they savvy enough to take early advantage of potentially loose underwriting policies that may exist in a relatively immature market that is growing rapidly. Either way, the opportunity window is…
Author: ISBuzz Team
New flagship event of London Technology Week sees thousands of visitors flock to ExCeL London Interop London, the major new UK technology event and flagship of London Technology Week, has been declared a huge success after it attracted representatives from 59 countries to ExCeL London over its three days. With more than 150 exhibitors and 200 speakers, the event drew huge crowds of IT and technology professionals between June 16-18 with 65% of attendees senior decision makers. Designed to connect the IT and technology communities around the world, Interop London featured a world-class education programme and hundreds of solution providers…
The U.S. government Office of Personnel Management data breach was much larger than previously thought – that every federal employee’s social security number along with other personnel records data (all unencrypted) has been exposed – led to the following reaction from global cybersecurity experts. Igor Baikalov, Chief Scientist, Securonix (www.securonix.com): “And yet another breach disclosure. Another shoe drops – and it’s just the shoe that we hear drop. Knowing our government’s urge for full and immediate disclosure, you know there’s a lot more to come out. And if you are a federal employee affected by this breach, you better pray…
Is there a future for information managers? Records and information managers (RIMs) belong at the heart of an organisation’s information management strategy. They are responsible for knowing what information exists, who has or has had access to it, where it is now, how safe it is and when it’s time to let it go. These activities are critical for protecting information and enabling organisations to make the most of it. But the world around the RIMs is changing, and their role and influence is changing with it. Today, information exists in multiple formats, most of them digital. As a consequence,…
Security experts from VASCO Data Security, Secure Channels and Proficio commented on the US OPM Hack John Gunn, VP of Communications, VASCO Data Security: “It’s a modern tragedy that so many innocent people will be victimized by hackers through no fault of their own, but simply because the stewards of their personal data failed to act in an appropriate manner to protect them. The implementation of simple and inexpensive security measures could have prevented this disaster.” Richard Blech, CEO and Co-Founder, Secure Channels: “This is a travesty of first order. The “Einstein System” that the OPM used to protect all…
RSA Survey of Nearly 850 IT Security Professionals Finds They Don’t Know How to Detect and Respond to Key and Certificate Vulnerabilities Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, today released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT security professionals during the week of April 20th in San Francisco. The survey data reveals that most IT security professionals acknowledge they don’t know how to detect or remediate quickly from compromised cryptographic keys and digital certificates, the foundation of trust in our modern, digital world. Attacks…
OVER 80% OF USERS SAY VARONIS HAS IMPROVED OR SIGNIFICANTLY IMPROVED THEIR ABILITY TO PREVENT, DETECT AND RECOVER FROM DATA BREACHES More than 80% of IT professionals surveyed since April state that Varonis software has improved, or greatly improved, their organisations’ ability to prevent, detect and recover from data breaches. The surveys were conducted by Varonis Systems, Inc. (Nasdaq:VRNS), the leading provider of software solutions for unstructured enterprise data. For the last 10 years, Varonis has been developing and perfecting a range of innovative solutions built on its patented core Metadata Framework technology. Currently powering five distinct Varonis products, the…
Risk assessment needs to be comprehensive and global Many financial institutions fail to perform comprehensive risk analysis and assessment, exposing their companies and clients to enormous risk. For example, many banks tend to underestimate or even ignore the security of their websites, focusing instead on “more sensitive” web applications such as e-banking. This is totally wrong, as even if the bank website does not contain any financial data, it is a perfect target for cybercriminals. For example, a medium-risk Cross-Site Scripting (XSS) vulnerability on the bank website may be used to perform spear-phishing campaigns against bank’s clients, infecting their PCs…
Fourth consecutive year that Agari is honored for its leadership in brand protection, privacy and security Agari, the leading provider of data-driven security solutions that detect and prevent advanced email cyberthreats, today announced it has been chosen for the Online Trust Alliance (OTA) 2015 Online Trust Honor Roll for the fourth year in a row. Each year, OTA, the non-profit with the mission to enhance online trust, evaluates websites based on their dedication to consumer protection, privacy and security. This annual audit includes more than 800 sites, including the Internet Retailer 500, FDIC 100 banks, social networking companies, government agencies, as well…
Brad Taylor, CEO, Proficio commented on the middle attack, 49 arrested, 6mil euros theft: “There are many variations of scams that use social engineering to convince targets to wire funds to bank accounts controlled by the fraudsters. Some use similar domain names to trick targets into thinking they are receiving a legitimate email from their manager or a vendor with a request to transfer funds. Organizations should educate their finance teams to be aware of such attack and identify suspicious, lookalike email domains and block them.” [su_box title=”About Proficio” style=”noise” box_color=”#0e0d0d”] Proficio is a leading Managed Security Service Provider (MSSP) changing…