Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Data Loss Prevention: Artificial Intelligence vs. Human Insight
Expert On How The UK Police Data Loss...
Cyber Criminals Left Stolen Phishing Credentials Exposed To...
Cyber Expert On Malware Found On Laptops Provided...
OpenText Research Offers A Snapshot Of UK Attitudes...
How Much Are You Worth On The Dark...
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Category:

Expert Comments

August 25, 2015

“New DDoS” Attack is very Disorienting, as Portmap Attacks

Portmap Attacks
Dot Your Expert Comments
August 25, 2015

600,000 Taxpayers have been Affected by Cyberattacks on the IRS

IRS data breach
Dot Your Expert Comments
August 24, 2015

Google’s Stagefright Patch Fails

Stagefright - Google Patch Failure
Dot Your Expert Comments
August 24, 2015

Hackers can Access Dropbox, Google Drive Accounts without the User’s Password

hackers could easily hijack user accounts
Dot Your Expert Comments
August 21, 2015

32 Members are Charged for ‘Insider Trading Hack’

insider trading hack
Dot Your Expert Comments
August 21, 2015

Hacker Group Targeting the Island’s Firms

targeting the island's firms
Dot Your Expert Comments
August 21, 2015

Websites Knocked Offline by Accidental DDoS Attack

Accidental DDoS Attack
Dot Your Expert Comments
August 20, 2015

Carphone Warehouse Breach Puts 2.4 Million Customers at Risk

Carphone UK Hack
Dot Your Expert Comments
June 2, 2015

What are the main reasons for private cloud failure and how can we overcome such failures

private cloud failure
Dot Your Expert Comments
May 1, 2015

Three Essential Security Practices that an Organization Must Adopt to Avoid IT Security Breaches

essential security practice
Dot Your Expert Comments
March 26, 2015

IoT – Everyone is Working to the Beat of Their Own Drum

Charles Sweeney
Dot Your Expert Comments
March 10, 2015

Curly Hair Don’t Work for Security Awareness

Human mind and IT security
Dot Your Expert Comments
March 5, 2015

Global Awareness Training to Combat IoT’s Insecurity

Claus Cramon Houmann
Dot Your Expert Comments
February 26, 2015

It’s Time for a Radically Different Approach to Application Security

application security
Dot Your Expert Comments
February 25, 2015

Why Are We Still Constantly Surprised That Intelligence (Espionage) Agencies Do Exactly What They’re Supposed To Do?

intelligence agencies
Dot Your Expert Comments
December 2, 2014

The Dark Web – Balancing Privacy and Security

Charles Sweeney
Dot Your Expert Comments
December 1, 2014

Tor – Not As Private But More Dangerous Than You Think

allan_pratt
Dot Your Expert Comments
November 17, 2014

The Dark Web Shouldn’t Be Necessary for Security

Claus Cramon Houmann
Dot Your Expert Comments
November 6, 2014

The Cloud: A Historical Contest Between Hardware and Software Vendors

host unknown
Dot Your Expert Comments
November 5, 2014

Cloud Security – What Businesses Should Consider

cloud security
Dot Your Expert Comments
October 29, 2014

Don’t Cut Corners With Your Cloud

Sarah_Clarke
Dot Your Expert Comments
October 27, 2014

Moving to the Cloud Extends a Company’s Threat Surface

Charles Sweeney
Dot Your Expert Comments
October 22, 2014

Do Your Research When Considering Using the Cloud

allan_pratt
Dot Your Expert Comments
October 20, 2014

Evaluating Cloud Applications and Their Data Value

lori_macvittie
Dot Your Expert Comments
October 16, 2014

The Risks of Using Cloud Applications

Claus Cramon Houmann
Dot Your Expert Comments
October 14, 2014

I Saw the Best Minds of My Generation Destroyed by the Cloud

mark_stanislav
Dot Your Expert Comments
  • ‹
  • 1
  • …
  • 208
  • 209
  • 210
  • 211
  • ›
Loading...

SECURELY DOTTED BY

Matias Madou, Co-founder and CTO, Secure Code Warrior

"It’s imperative that all developers are trained in how to code securely from the outset. "

Expert On How The UK Police Data Loss Could Have Been Easily Prevented

Stephen Kapp, CTO and Founder, Cortex Insight

"Pixlr should look to improve its internal processes by holding user information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

George Glass, Head of Threat Intelligence, Redscan

"Gamarue is able to spread across a user’s local network and is also capable of installing additional strains of malware. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Jake Moore, Cybersecurity Specialist, ESET

"Gamarue.1 is an old virus from quite a few years ago. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"New and young students using online learning for the first time are most vulnerable. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"All computers, no matter the make, model, or operating system should run some type of antivirus or anti-malware protection. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Department of Education should be putting security parameters. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Sam Curry, Chief Security Officer, Cybereason

"The National Cyber Security Centre offer free advice on secure home working. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Brian Higgins, Security Specialist, Comparitech.com

"The potential for malicious software to be used against recipients is not limited to the children. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Chloé Messdaghi, VP of Strategy, Point3 Security

"The attack approach was also clever. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Saryu Nayyar, CEO, Gurucul

"Organizations still need to maintain strong perimeter and interior defenses. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Oliver Cronk, Chief IT Architect, EMEA, Tanium

"This story is part of a wider challenge facing schools at the moment. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Andy Teichholz, Senior Industry Strategist, Compliance and Legal, OpenText

"In our new digital economy, people around the world are becoming acutely aware of how their information is being collected, stored, and used. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Lou Blatt, Senior Vice President and CMO, OpenText

"Digital is now central to almost every business interaction – generating more data for companies to manage and secure. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Greg Bell, CEO, Corelight

"This type of network infiltration is often difficult to identify. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.