A recent report published by the British government and the insurance sector, aimed at addressing concerns surrounding Cyber security, revealed that 98 per cent of large UK firms do not have an insurance policy in place which could help them recover from a serious cyber attack, despite 81 per cent suffering a breach in the past 12 months.
Author: ISBuzz Team
Igor Baikalov, chief scientist at Securonix (www.securonix.com), provided the following analysis of reports of a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number.
Ryan Barnett, Senior Lead Security Researcher, Trustwave has analysed a real-world web compromise exploiting a Drupal SQL injection vulnerability (a.k.a. Drupalgeddon) that enables criminals to take control of websites. In this blog post, he will take a step-by-step analysis of a real world compromise of a Drupal web application.
Data’s role in marketing is ever-evolving. Companies are maintaining their pace of investment in data studies and strengthening the sophistication of personalized multi-channel campaigns.
Hans Zandbelt, Senior Technical Architect at Ping Identity, discusses the role identity will play in securing and enabling broader internet in 2015. In 2014 we saw connected homes and mobile wallets became a reality. The Internet of Things (IoT) well and truly entered the mainstream, with high profile events such as the Consumer Electronics Show bringing everything ‘IoT’ to the forefront of the news agenda.
Following the launch last week of IBM’s State of Mobile Application Insecurity report, which highlights that enterprises aren’t investing in mobile security, Mark Noctor, EMEA Sales Director at Arxan Technologies has the following comment in response to these findings.
In response to Brian Krebs’ blog which details a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number. Here to comment on this blog is Kevin Westin, senior security analyst with Tripwire.
Iron Mountain study shows 89 per cent of UK business leaders don’t fully understand what their records and information managers do Making the most of information is a priority for many businesses. However, a new study from storage and information management company,
Recent headlines have put the healthcare industry in the spotlight, and have many asking if current security best practices are enough. But this is not a new story. It’s just the latest one.
15,435 vulnerabilities in close to 4,000 applications in 2014 15,435 vulnerabilities across 3,870 applications were recorded in 2014 – that’s an 18% increase in vulnerabilities compared to the year before, and a 22% increase in the number of products.