Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Data Loss Prevention: Artificial Intelligence vs. Human Insight
Expert On How The UK Police Data Loss...
Cyber Criminals Left Stolen Phishing Credentials Exposed To...
Cyber Expert On Malware Found On Laptops Provided...
OpenText Research Offers A Snapshot Of UK Attitudes...
How Much Are You Worth On The Dark...
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Expert(s): November 30, 2020
Tim Mackey
Principal Security Strategistfeature_status*/ ?>
Synopsys CyRC

Comments Dotted : 59
January 08, 2021

Experts Reacted On Hackney Council Leaked Documents

At best there is a hope the attackers will do as they state and not release the data.

Whenever an organisation is in the position of dealing with a demand of ransom from a cyber-attack, the time for securing data has passed. At best there is a hope the attackers will do as they state and not release the data, but there is nothing to say that copies didn’t otherwise exist, and the attackers view the ransom as but one of a number of revenue streams associated with the data. While there is value in performing post-incident forensic analysis, the best analysis is performed prior

.....Read More

Whenever an organisation is in the position of dealing with a demand of ransom from a cyber-attack, the time for securing data has passed. At best there is a hope the attackers will do as they state and not release the data, but there is nothing to say that copies didn’t otherwise exist, and the attackers view the ransom as but one of a number of revenue streams associated with the data. While there is value in performing post-incident forensic analysis, the best analysis is performed prior to the incident. Such analysis should include an understanding of which data attributes are accessible to which employees, contractors or third-party services and what controls and protections are in place to limit the scope of damage should a compromise of any staff or external system occur. This forms a data supply chain analysis and is similar to the risk analysis organisations should be performing on their software supply chains. Ultimately, the goal of these efforts should be a comprehensive threat model that includes an understanding of what monitoring actions and alarms should be in place to detect attempts to circumvent cybersecurity measures. While this effort might not prevent a ransomware attack, it could limit the scope of damage within the organisation and increase the difficulty an attacker might have when attempting to access any data.

  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"At best there is a hope the attackers will do as they state and not release the data...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-hackney-council-leaked-documents

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"At best there is a hope the attackers will do as they state and not release the data...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-hackney-council-leaked-documents

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 03, 2020

Experts Reaction On Dua Lipa And Other Spotify Artists’ Pages Hacked By Taylor Swift ‘Fan’

From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site.
While the details of what weaknesses in Spotify’s security practices remain unknown, the attack highlights an important aspect of all cyber-attacks – the attackers define the rules of their attack. In this case, vandalism is an obvious component, but it could also be but one aspect of their ultimate goal. From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site, I would recommend that all Spotify users take this.....Read More
While the details of what weaknesses in Spotify’s security practices remain unknown, the attack highlights an important aspect of all cyber-attacks – the attackers define the rules of their attack. In this case, vandalism is an obvious component, but it could also be but one aspect of their ultimate goal. From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site, I would recommend that all Spotify users take this opportunity to reset their passwords and review which apps they’ve linked to the Spotify service. Businesses seeking to learn from this incident should ask themselves how quickly they would be able to identify if they had fallen victim to a similar defacement effort. If the answer isn’t affirming, then a review of audit and monitoring practices is in order, along with a review of incident response planning.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-dua-lipa-and-other-spotify-artists-pages-hacked-by-taylor-swift-fan

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-dua-lipa-and-other-spotify-artists-pages-hacked-by-taylor-swift-fan

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 02, 2020

Expert Reaction On Half Of All Docker Hub Images Have At Least One Critical Vulnerability

Container images are a combination of an application.
Container images are a combination of an application with operating system elements and supporting frameworks. Development teams creating distributed systems following a microservice or cloud native philosophy will select third-party container images to perform one of two functions. Either the container image is used “as is” to provide a shared service, such as with a database, or will be embedded as a base image to create a new container image. In both situations, the design and security.....Read More
Container images are a combination of an application with operating system elements and supporting frameworks. Development teams creating distributed systems following a microservice or cloud native philosophy will select third-party container images to perform one of two functions. Either the container image is used “as is” to provide a shared service, such as with a database, or will be embedded as a base image to create a new container image. In both situations, the design and security practices of the team creating the original container image have a direct impact on the security of the resultant system. Put another way, do you trust that a third-party development team has followed security practices that are at least as stringent as those you expect your own team to follow? This is critical given that production operating systems should be hardened and have a minimal attack surface, and that container images typically have operating system components in them. When selecting an image from Docker Hub, a development team is implicitly stating that they trust the security practices of the author of that container image. Such implicit trust is risky from a security perspective, which is why many organisations are now creating hardened container images where the image hardening process is managed by a dedicated team skilled in operating system hardening which is separate from the core development team. These hardened images are then pushed to an internal registry and policies are defined that only allow images originating from hardened images in that internal registry to execute in a production cluster.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Container images are a combination of an application...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reaction-on-half-of-all-docker-hub-images-have-at-least-one-critical-vulnerability

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Container images are a combination of an application...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reaction-on-half-of-all-docker-hub-images-have-at-least-one-critical-vulnerability

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 01, 2020

Experts Insight On Baltimore County Public Schools Fall Victim To A Ransomware Attack

£5 to £10 quid per month in reward points for an app.
Over the years I’ve often been asked about consumers having a marketplace to sell or minimally manage their personal data with a core question of how much consumers might charge. Now we have it – £5 to £10 quid per month in reward points for an app to monitor all internet usage while also having an excess in app permissions allowing the app to listen to background conversations. For some this might be appealing, but it should clearly demonstrate to everyone that personal data is valuable .....Read More
Over the years I’ve often been asked about consumers having a marketplace to sell or minimally manage their personal data with a core question of how much consumers might charge. Now we have it – £5 to £10 quid per month in reward points for an app to monitor all internet usage while also having an excess in app permissions allowing the app to listen to background conversations. For some this might be appealing, but it should clearly demonstrate to everyone that personal data is valuable to app authors. After all, the £5-£10 quid per month has to be coming from somewhere, and all the user has done is provide internet access data.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"£5 to £10 quid per month in reward points for an app...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-baltimore-county-public-schools-fall-victim-to-a-ransomware-attack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"£5 to £10 quid per month in reward points for an app...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-baltimore-county-public-schools-fall-victim-to-a-ransomware-attack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 23, 2020

Experts Reaction On Verizon Cyber-Espionage Report

The starting point in such a defence is a comprehensive inventory of all software.
If your business were a target of a well-funded malicious group, how would you know? For most victims, the initial exploited weakness was likely an opportunistic one, even when the damage done was significant. Victims of cyber espionage find themselves subject to a strategic set of actions. As highlighted in the report, cyber espionage teams are often well-funded and highly skilled. This combination allows them to infiltrate a business quickly and leave few traces behind which in turn increases .....Read More
If your business were a target of a well-funded malicious group, how would you know? For most victims, the initial exploited weakness was likely an opportunistic one, even when the damage done was significant. Victims of cyber espionage find themselves subject to a strategic set of actions. As highlighted in the report, cyber espionage teams are often well-funded and highly skilled. This combination allows them to infiltrate a business quickly and leave few traces behind which in turn increases the potential for ongoing damage. While their motivations might be financial, the rules they follow in their attacks will be unique to each team – even an outcome such as a ransomware demand might occur. Defending against such an attack requires businesses to identify what assets they possess and how those assets might be valuable to an attacker – be that as a stepping stone along the attack path or as a saleable commodity. The starting point in such a defence is a comprehensive inventory of all software, how it’s configured, its role within the organisation, how it’s connected to other software powering the business and what data it has access to. From there a data model can be created that maps users to data and systems in a manner that allows for audit rules to be defined. Once audit rules are in place, monitoring can begin which then feeds into monitoring for unexpected access. While this process can be daunting, it should be considered a work in progress which supports good business hygiene such as patch management, disaster recovery planning and compliance with data privacy regulations.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The starting point in such a defence is a comprehensive inventory of all software...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-verizon-cyber-espionage-report

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The starting point in such a defence is a comprehensive inventory of all software...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reaction-on-verizon-cyber-espionage-report

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 28, 2020

Expert Reacted On Isentia Breach And Its Impact On Government Departments

The underlying threat models should take into account how an attacker might use the data they collect.
Ransomware attacks are on the rise, and for the attackers, it’s likely comforting to learn that per IDC’s ANZ Ransomware Survey almost 1/3 of ANZ organisations hit by ransomware in the past two years paid the ransom. Unfortunately, when payment occurs, those monies are then available to create yet more innovative attacks, and potentially fund other criminal activity – a situation highlighted by the US Department of the Treasury’s Office of Foreign Assets Control in an advisory last.....Read More
Ransomware attacks are on the rise, and for the attackers, it’s likely comforting to learn that per IDC’s ANZ Ransomware Survey almost 1/3 of ANZ organisations hit by ransomware in the past two years paid the ransom. Unfortunately, when payment occurs, those monies are then available to create yet more innovative attacks, and potentially fund other criminal activity – a situation highlighted by the US Department of the Treasury’s Office of Foreign Assets Control in an advisory last week. For businesses seeking to restore operations quickly, payment of the ransom may seem like an acceptable solution. Unfortunately, as the Toll Group found earlier this year, implementing IT improvements following one attack doesn’t preclude another successful attack. Defending against any type of malware requires a comprehensive plan that looks at human factors in addition to technologies. Importantly, the underlying threat models should take into account how an attacker might use the data they collect. In the case of Isentia, customers should look to change any credentials they’ve provided on the Isentia platform as well as to revoke any access tokens to media platforms Isentia was monitoring for them. Doing so could limit ongoing damage if Isentia's customer data was exfiltrated during the attack.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The underlying threat models should take into account how an attacker might use the data they collect...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reacted-on-isentia-breach-and-its-impact-on-government-departments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The underlying threat models should take into account how an attacker might use the data they collect...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reacted-on-isentia-breach-and-its-impact-on-government-departments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 04, 2020

Comment: 73% Of Security Professionals And Developers Sacrifice Security For Speed

To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow.
Prioritisation of feature development relative to security has long been a challenge, but it’s not without a solution. In a DevSecOps world, empowering development teams can result in higher quality code with fewer security defects. To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow and not simply bolt it on at the end of the development process. By embedding this knowledge within the development flow, security knowledge created .....Read More
Prioritisation of feature development relative to security has long been a challenge, but it’s not without a solution. In a DevSecOps world, empowering development teams can result in higher quality code with fewer security defects. To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow and not simply bolt it on at the end of the development process. By embedding this knowledge within the development flow, security knowledge created by one team can be shared by others within the overall software development lifecycle (SDLC). For example, if an Ops team is aware of security weaknesses present in the code they run, but which Dev teams have triaged for future resolution, the Ops teams are then able to compensate for any weaknesses. By focusing on the information flow and not the tooling, organisations can increase tool usage by raising the awareness of the types of findings uncovered by specific security techniques which then in turn increases the overall security competency within development teams as they process this security information. When armed with low friction activities like creating threat models and security team participation in scrums, an organisation’s security maturity can increase quickly by making everyone part of the solution. An effective template for this process can be found in recent ESG research on modern application development security.  Read Less
Like(4)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-73-of-security-professionals-and-developers-sacrifice-security-for-speed

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-73-of-security-professionals-and-developers-sacrifice-security-for-speed

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 04, 2020

Security Expert On Amazon One – Palm Scanner Launched For ‘Secure’ Payments

Biometric based user identification is nothing new.
Biometric based user identification is nothing new. In recent years programs like CLEAR in the US incorporate biometrics to identify airline passengers and programs like Global Entry offer the similar functionality for US passport control. Extending this capability to payment systems is a logical step, but one where participation should be voluntary. Malicious groups know that health and biometric data isn’t easily replaced making it a prime target for any attack. This means that any.....Read More
Biometric based user identification is nothing new. In recent years programs like CLEAR in the US incorporate biometrics to identify airline passengers and programs like Global Entry offer the similar functionality for US passport control. Extending this capability to payment systems is a logical step, but one where participation should be voluntary. Malicious groups know that health and biometric data isn’t easily replaced making it a prime target for any attack. This means that any biometric-based payment system needs to address the question of data compromise within its design and ensure that software designs are kept current with the threat prevailing landscape. After all, as software designs age, implementation decisions that were once thought “best practice” can show their age and become exploitable.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Biometric based user identification is nothing new. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-on-amazon-one-palm-scanner-launched-for-secure-payments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Biometric based user identification is nothing new. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-on-amazon-one-palm-scanner-launched-for-secure-payments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 23, 2020

What Experts Says On House Approves Bill Making Hacking Federal Voting Systems A Crime?

The Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines.
We can all agree that malicious access to a voting machine at any point in its life is a bad thing , so for those of you who thought it was already illegal to hack a voting machine; things are complicated. Since voting machines are owned and managed at the local district level, and aren’t involved in interstate commerce, the Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines. With passage of the Defending the Integrity of Voting Systems Act, the CFAA was .....Read More
We can all agree that malicious access to a voting machine at any point in its life is a bad thing , so for those of you who thought it was already illegal to hack a voting machine; things are complicated. Since voting machines are owned and managed at the local district level, and aren’t involved in interstate commerce, the Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines. With passage of the Defending the Integrity of Voting Systems Act, the CFAA was amended meaning that unauthorised access to local voting machines used in Federal elections will become subject to CFAA. Unfortunately the CFAA isn’t without controversy as it doesn’t define “unauthorised access”. Clarification of this situation is currently before the US Supreme Court where the outcome could have a significant impact on how cybersecurity research is conducted and the scope of what research is permissible.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/what-experts-says-on-house-approves-bill-making-hacking-federal-voting-systems-a-crime

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/what-experts-says-on-house-approves-bill-making-hacking-federal-voting-systems-a-crime

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 04, 2020

Expert On Study Finds Serious Problems With Vulnerability Management

Once armed with that inventory, then a patch policy can be created for each item.
It’s not surprising to find that IT organisations have a disconnect between their perception of patch maturity and the reality of the software running within their organisations. While many businesses likely have a mature patch management strategy around servers and corporate-owned desktops and laptops, these represent a fraction of the software running in a business. Further, if the patch management strategy employed presumes that patches will originate from a commercial software vendor,.....Read More
It’s not surprising to find that IT organisations have a disconnect between their perception of patch maturity and the reality of the software running within their organisations. While many businesses likely have a mature patch management strategy around servers and corporate-owned desktops and laptops, these represent a fraction of the software running in a business. Further, if the patch management strategy employed presumes that patches will originate from a commercial software vendor, then that strategy likely doesn’t account for the increasing level of open-source software powering modern business operations. This is of course before software associated with embedded software running enterprise IoT solutions such as security cameras. A comprehensive patch management solution needs to include a complete inventory of all software, independent of its origin or role. Once armed with that inventory, then a patch policy can be created for each item. Only at that point can the patch process be considered reasonably mature as it is impossible to patch software you don’t know you’re running.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Once armed with that inventory, then a patch policy can be created for each item...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-study-finds-serious-problems-with-vulnerability-management

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Mackey, Principal Security Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Once armed with that inventory, then a patch policy can be created for each item...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-study-finds-serious-problems-with-vulnerability-management

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Matias Madou, Co-founder and CTO, Secure Code Warrior

"It’s imperative that all developers are trained in how to code securely from the outset. "

Expert On How The UK Police Data Loss Could Have Been Easily Prevented

Stephen Kapp, CTO and Founder, Cortex Insight

"Pixlr should look to improve its internal processes by holding user information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

George Glass, Head of Threat Intelligence, Redscan

"Gamarue is able to spread across a user’s local network and is also capable of installing additional strains of malware. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Jake Moore, Cybersecurity Specialist, ESET

"Gamarue.1 is an old virus from quite a few years ago. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"New and young students using online learning for the first time are most vulnerable. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"All computers, no matter the make, model, or operating system should run some type of antivirus or anti-malware protection. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Department of Education should be putting security parameters. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Sam Curry, Chief Security Officer, Cybereason

"The National Cyber Security Centre offer free advice on secure home working. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Brian Higgins, Security Specialist, Comparitech.com

"The potential for malicious software to be used against recipients is not limited to the children. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Chloé Messdaghi, VP of Strategy, Point3 Security

"The attack approach was also clever. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Saryu Nayyar, CEO, Gurucul

"Organizations still need to maintain strong perimeter and interior defenses. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Oliver Cronk, Chief IT Architect, EMEA, Tanium

"This story is part of a wider challenge facing schools at the moment. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Andy Teichholz, Senior Industry Strategist, Compliance and Legal, OpenText

"In our new digital economy, people around the world are becoming acutely aware of how their information is being collected, stored, and used. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Lou Blatt, Senior Vice President and CMO, OpenText

"Digital is now central to almost every business interaction – generating more data for companies to manage and secure. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Greg Bell, CEO, Corelight

"This type of network infiltration is often difficult to identify. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel