Dear IT security specialists, We present you with a unique opportunity to take part in an international survey on cybersecurity. The best experts in the field are invited to share their expertise on IT Security industry. Follow this link 3HRCEIha5h and fill out the survey – it takes less than 4 minutes. At the start of next week you will receive a full report about current demand for IT security products worldwide, with complete analysis of the survey. This survey is conducted on behalf of one of the leading IT sytem integrators in Eastern Europe “BMS Consulting”. We greatly appreciate your participation!…
Author: Information Security Buzz Editorial Staff
Today, Information Security Buzz launches its specialized job board (www.isbuzz.jobs) for information security industry. You can access the site here. ISbuzz.jobs is a site that connects employers and job-seekers in the IT Security field in more dynamic way. As a leader in IT Security news, and a valued resource for IT Security professionals, ISbuzz.jobs is a site that intelligently divides the IT security jobs into more than 20 categories which allows the job seeker to find the job he/she wishes for anywhere in the world from up over to down under. Additionally, employers can skillfully find the employees they want. The ISBuzz team…
The strength of passwords as an authentication control is more important than ever before. Cyber-criminals are increasingly using automated password cracking tools to identify passwords in a matter of seconds. Our 2015 Trustwave Global Security Report revealed that out of a password sample size of 499,556 hashed passwords, our experts cracked 51 percent of them within 24 hours and 88 percent within two weeks. There are many factors related to the high number of passwords being cracked in such a short period of time such as organisations repeatedly using the same, easy-to-guess passwords. Our experts found that “Password1” remained the…
Your smartphone contains information about everything in your personal and professional life. This means that protecting the information that may be on your phone is paramount, especially in this day and age when information is so much more valuable than it was even just a few years ago. Protecting your smartphone has gone beyond having a simple pin, with features like gesture unlocking, face detection and fingerprint scanning. Here are just a few ways security has evolved with the latest version of Android: Smart Locks All touchscreen smartphones like the Galaxy S 6 Edge have several forms of screen locks…
Netwrix investigates three recent security breaches to help the IT community avoid pitfalls in protecting customer financial data The unprecedented number of data breaches over the last year has increased investigation of attack patterns and deep post-breach analysis to reveal the root cause. Knowing your IT environment gives you better control over your most critical systems, but awareness of what is going on outside your perimeter gives you the opportunity to proactively prepare for possible cyberattacks. The negative experiences of other market players, especially in the financial sector, may serve as an excellent guideline for identifying existing gaps and strengthening…
In the spirit of The Washington Post’s regular column, “5 Myths,” here is “a challenge to everything you think you know” about Threat Intelligence. You may already know that cyber threat intelligence from both internal and external sources can provide value when it is researched, analyzed and disseminated correctly. The benefits include: Changing an organization’s security model from reactive to proactive Shrinking the security alert problem that is overwhelming most security teams Driving better, more informed responses to security incidents Extending the life of aging security technologies and turbo charging new defenses by feeding them real-time intelligence updates to enable…
Proficio Inc. introduced ProSOC Express, providing mid-sized businesses 24×7 enterprise-class security monitoring and alerting services.The cloud-based security services leader is including the same advanced SIEM technology and 24×7 expert monitoring in the affordable SaaS subscription service that Proficio provides its large enterprise customers. Tim McElwee, COO and Chairman, Proficio, Inc. noted: “A major reason for this shift to small- and mid-sized firms is that large companies have improved their IT defenses and security procedures. Cyber criminals view mid-sized organizations as soft targets for data theft, bank fraud, and ransomware. While businesses often have the right tools to help identify attacks, they seldom have time to…
Security industry experts are beginning to react to today’s news of the massive data breach at the U.S. Office of Personnel Management. Here are some initial comments – Mark Bower, Global Director – Product Management, HP Security Voltage (www.voltage.com): “Theft of personal and demographic data allows one of the most effective secondary attacks to be mounted: direct spear-phishing to yield access to deeper system access, via credentials or malware thus accessing more sensitive data repositories as a consequence. These attacks, now common, bypass classic perimeter defenses and data-at-rest security and can only realistically be neutralized with more contemporary data-centric security…
At InfoSecurity (2-4 June) ManageEngine director of product management Rajesh Ganesan is discussing India’s meteoric rise as a global technology hub and explaining how his firm has gained an international reputation by building innovative IT management solutions for enterprise businesses Recent substantial investment in India’s US$150 billion (95 billion pound) tech industry reflects the country’s speedy transition from international outsourcing service provider to global technology hub. According to CB Insights, the number of venture funding deals for India tech companies in the first quarter of 2015 topped $1bn for the third straight quarter, up 225% versus the same quarter the year…
Our Global Encryption and Key Management Trends report is now in its tenth year, providing an annual ‘pulse check’ on enterprise approach to and deployment of encryption techniques. The picture across the board is clear – use of encryption is growing across all industries. There can be no doubt that the series of mega breaches and cyber-attacks over the course of the last year have increased companies’ urgency to improve their security posture. Perhaps unsurprisingly, this is particularly true in healthcare and retail, which show the greatest leap since last year in adoption of this technology. Names such as Home…