Patrick Peterson, CEO & Founder, Agari, attended the recent RSA conference and has shared the following comments “At this year’s RSA conference, it became apparent that the influx of new start-ups focused on malware, breach detection or threat intelligence, means that there is a lack of solutions that solve the inherent security issues that bedevil our digital economy and harm brands and people. As a result, it was also obvious that there is a huge opportunity for the security industry to mature. Just five years ago, there were precious few boards of large companies that gave even a second thought to security. But…
Author: ISBuzz Team
As many of you have heard, Tesla Motors’ website was “hacked” as well as its official Twitter account. The teslamotors.com website was redirected to a server hosted in Amsterdam. Within a few minutes, the account began sending tweets promising free Tesla cars to those who called a certain phone number, which belonged to a computer repair shop in Illinois, and was presumably tweeted out to flood the number’s owner with calls. Later that same day it was revealed that Tesla founder Elon Musk’s Twitter account was compromised. According to Dave Smith at Business Insider “though the parties claiming responsibility offer up different…
Chrome now rules the global mobile and desktop browser market – but how did it win the game of browser-thrones? Source: Visit HERE
Comment from Martin Sugden, MD of Boldon James on the following news that Russian hackers had gained access to some of President Obama’s unclassified and confidential emails. “The recent news that Russian hackers had accessed the White House IT network and President Obama’s unclassified emails highlights that if you don’t classify emails and have the correct tools in place to protect information, such breaches can and do occur. Users operate at different levels, either on restricted and unrestricted platforms; without classification labels, they can be confused as to how they should be handling such data. In the UK, under the Government…
Vault Takes a Novel Approach to Key and Secret Management by Dynamically Rotating Access Credentials HashiCorp, a leader in the DevOps marketplace, today released Vault, a unified solution for secure key and secret management complete with in-transit encryption, key rolling, key revocation, and detailed audit logs. This is HashiCorp’s sixth open source project along with Vagrant, Packer, Serf, Consul, and Terraform. Collectively these projects have millions of downloads, and users from AOL, Disqus, Twitch, Akamai, Expedia, Mozilla, and others. Vault is designed for modern enterprise organizations — organizations that build applications for the distributed, dynamic infrastructure era and view application…
Phil Beckett, partner at Proven Legal Technologies – the corporate forensic investigation and e-disclosure experts, comments on the latest news that Deutsche bank has been fined £1.7bn over Libor failings: “This is an example of serious employee malpractice that could have been captured by a more thorough analysis of communications in a proactive context. Intelligent analysis of company data – such as chat messages– on a regular basis can provide early warnings of issues such as those uncovered in the Libor scandal. “Until now, audits of company data have primarily been used posthumously as way of finding out “what went…
Parrot Automotive Media Center is being adapted to fit into the vehicles of major vehicle manufacturer to bring “content” anywhere, anytime INSIDE Secure (Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, announce that Parrot, a major innovator who designs, develops and markets consumer products for smartphones and tablets as well as high technology solutions in the Automotive and UAV business, has licensed INSIDE Secure’s HDCP[1] technology to protect it’s state-of-the-art Automotive Media Center. Parrot also offers the most extensive range of hands-free communication systems on the market for cars. Its globally recognized expertise in…
94% of Survey Respondents Believe NSA Surveillance of U.S. Citizens Has Either Remained at the Same Level or Increased in the Past Two Years Thycotic did a field survey of 200 RSA attendees about their thoughts on NSA surveillance since the Edward Snowden affair, Obama’s newly formed Cyber Threat Intelligence Integration Center and the strength of the U.S.’s cyber hacking capabilities relative to those of Russia, North Korea and China. Thycotic, a provider of smart and effective privileged account management solutions for global organizations, announced the results of a survey of 202 RSA Conference 2015 attendees conducted between April 20th and…
Proofpoint has released the second installment of its Human Factor Report. The report gives in-depth insight into how hackers exploit the “human factor” in targeted attacks, as well as details on the percentage of malicious links in emails that actually get clicked on, the industries and job roles that are most heavily targeted with phishing, what types of phishing campaigns are most successful and how long an organisation has to find and stop a malicious email before it is clicked by an unsuspecting user. Key findings from the study are below, however a full copy of the study can be found here. On…
Protegrity announce a partnership with Xactly, a provider of cloud-based incentive solutions, giving companies needing higher levels of security assurance and protection the ability to store data securely in the cloud without having to forego any of the features provided by Xactly’s Incent solution. This is done through Protegrity’s Cloud Gateway, which protects the data before it even reaches the cloud. The cloud offers vast benefits for enterprises around the world, but time and time again, we hear from companies that security concerns are holding up adoption. This is particularly true of organizations that require added layers of data security due…