Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Data Loss Prevention: Artificial Intelligence vs. Human Insight
Expert On How The UK Police Data Loss...
Cyber Criminals Left Stolen Phishing Credentials Exposed To...
Cyber Expert On Malware Found On Laptops Provided...
OpenText Research Offers A Snapshot Of UK Attitudes...
How Much Are You Worth On The Dark...
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Expert(s): November 30, 2020
Stuart Sharp
VP of Solution Engineeringfeature_status*/ ?>
OneLogin

Comments Dotted : 28
December 18, 2020

Expert Reacted On Manchester To Explore Biometrics For Transport, Education And Health Services

Yes, biometrics have a role to play.
All too often, biometrics are seen as the panacea for solving the difficult task of accurately and securely identifying people with a seamless user experience. Yes, biometrics have a role to play, but they have important limitations, and if not deployed in the right way, they pose a significant risk. First of all, biometric identification is not 100% accurate — it relies on the probability of the facial or fingerprint scan, for example, belonging to the user, and operates with what is often .....Read More
All too often, biometrics are seen as the panacea for solving the difficult task of accurately and securely identifying people with a seamless user experience. Yes, biometrics have a role to play, but they have important limitations, and if not deployed in the right way, they pose a significant risk. First of all, biometric identification is not 100% accurate — it relies on the probability of the facial or fingerprint scan, for example, belonging to the user, and operates with what is often a relatively high False Acceptance Rate (the chance that the user is not who the system thinks they are). Secondly, if a biometric scan is ever compromised, there is no method for a user to get a new fingerprint or facial scan — you can’t just change it like you do a password. Thirdly, and most importantly, the biometric design proposed for Manchester requires every individual’s biometric vein pattern to be stored in a central government system which will become a prime target for hackers. A much more secure way to leverage biometrics is to rely on fingerprint and facial scanning functionality now available on most smartphones combined with a modern authentication standard like WebAuthn which includes protection against phishing and other forms of identity theft.  Read Less
Like(5)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Yes, biometrics have a role to play...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reacted-on-manchester-to-explore-biometrics-for-transport-education-and-health-services

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Yes, biometrics have a role to play...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reacted-on-manchester-to-explore-biometrics-for-transport-education-and-health-services

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 17, 2020

Face Verification And Multi-user SMS 2FA Options Added To SingPass – Expert Reaction

Face verification technology is certainly a stronger form of 2FA than SMS.
GovTech can be applauded for recognising that once size does not fit all when it comes to security, particularly with the introduction of multi-user SMS. Even though SMS OTP is vulnerable to SIM take-over and phishing-based attacks, introducing it as a second authentication factor greatly reduces the overall likelihood of attacks being successful. Face verification technology is certainly a stronger form of 2FA than SMS, but GovTech’s implementation of a government-owned centralised.....Read More
GovTech can be applauded for recognising that once size does not fit all when it comes to security, particularly with the introduction of multi-user SMS. Even though SMS OTP is vulnerable to SIM take-over and phishing-based attacks, introducing it as a second authentication factor greatly reduces the overall likelihood of attacks being successful. Face verification technology is certainly a stronger form of 2FA than SMS, but GovTech’s implementation of a government-owned centralised database of biometric information makes it a prime target for criminals who focus on compromising data stores that contain sensitive data for millions of users. A better approach would have been to rely on device-based biometrics that are already ubiquitous on smartphones, laptops and tablets. Biometric information would only be stored on the user’s personal device, with no central data store for hackers to target, and can leverage modern authentication standards like WebAuthn which have built-in protection against phishing attacks.  Read Less
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Face verification technology is certainly a stronger form of 2FA than SMS...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/face-verification-and-multi-user-sms-2fa-options-added-to-singpass-expert-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Face verification technology is certainly a stronger form of 2FA than SMS...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/face-verification-and-multi-user-sms-2fa-options-added-to-singpass-expert-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 17, 2020

Experts Reacted On Lazarus Malware Strikes South Korean Supply Chains

Maintaining good cybersecurity requires keeping an eye on the basics.
What has transpired here highlights how cybersecurity does not operate within a vacuum. Maintaining good cybersecurity requires keeping an eye on the basics, and ensuring that the organisations you partner with in the supply chain do as well - as the saying goes, your security is only as strong as your weakest link. In this instance, the South Korean government should ensure that the software manager verifies the owner of the certificate, and that all organisations within their supply chain are .....Read More
What has transpired here highlights how cybersecurity does not operate within a vacuum. Maintaining good cybersecurity requires keeping an eye on the basics, and ensuring that the organisations you partner with in the supply chain do as well - as the saying goes, your security is only as strong as your weakest link. In this instance, the South Korean government should ensure that the software manager verifies the owner of the certificate, and that all organisations within their supply chain are adhering to a standard set of cyber hygiene rules as well as performing regular security audits. This is particularly true if they are requiring users to download software to access certain services.  Read Less
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Maintaining good cybersecurity requires keeping an eye on the basics...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-lazarus-malware-strikes-south-korean-supply-chains

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Maintaining good cybersecurity requires keeping an eye on the basics...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-lazarus-malware-strikes-south-korean-supply-chains

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 24, 2020

Comment: Vulnerability allows hackers full access to Instagram accounts

By allowing remote access to an Instagram account, the attackers could use this for any purpose they wish.
This vulnerability shows just how vulnerable our online accounts are. By allowing remote access to an Instagram account, the attackers could use this for any purpose they wish, including blackmail or the compromise of high-profile or corporate Instagram accounts. Instagram must work as quickly as possible to patch this vulnerability - Service providers have a duty of care to their users to follow security best practices — the discovery of a vulnerability like this should prompt a service.....Read More
This vulnerability shows just how vulnerable our online accounts are. By allowing remote access to an Instagram account, the attackers could use this for any purpose they wish, including blackmail or the compromise of high-profile or corporate Instagram accounts. Instagram must work as quickly as possible to patch this vulnerability - Service providers have a duty of care to their users to follow security best practices — the discovery of a vulnerability like this should prompt a service provider to go back to the drawing board and have a radical rethink of their approach to security.  Read Less
Like(1)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"By allowing remote access to an Instagram account, the attackers could use this for any purpose they wish...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-vulnerability-allows-hackers-full-access-to-instagram-accounts

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"By allowing remote access to an Instagram account, the attackers could use this for any purpose they wish...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-vulnerability-allows-hackers-full-access-to-instagram-accounts

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 18, 2020

NCSC warns of ransomware attacks against UK universities – experts reaction

Security awareness training is also key in preventing employees and students from falling for phishing attacks.
The education sector is no different from any other industry, COVID-19 has accelerated its digital transformation programs. Accompanying this is a rise in ransomware attacks as we’ve seen in recent headlines. Fortunately, securing such institutions from an attack largely comes down to cyber hygiene - steps that have been laid out by the NCSC. Chief among them is the implementation of multi-factor authentication. This reduces the risk of attack by increasing the complexity of the exploit for.....Read More
The education sector is no different from any other industry, COVID-19 has accelerated its digital transformation programs. Accompanying this is a rise in ransomware attacks as we’ve seen in recent headlines. Fortunately, securing such institutions from an attack largely comes down to cyber hygiene - steps that have been laid out by the NCSC. Chief among them is the implementation of multi-factor authentication. This reduces the risk of attack by increasing the complexity of the exploit for the malicious attacker, as they must gain access to multiple authentication factors such as password, one-time token, and/or certificates. Generally speaking, they have a short period of time to do this prior to the authentication attempt expiring. Security awareness training is also key in preventing employees and students from falling for phishing attacks, a common attack vector. While the NCSC’s guide is helpful, it is irrelevant if educational institutions do not take action to apply the necessary measures.  Read Less
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Security awareness training is also key in preventing employees and students from falling for phishing attacks...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/ncsc-warns-of-ransomware-attacks-against-uk-universities-experts-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Security awareness training is also key in preventing employees and students from falling for phishing attacks...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/ncsc-warns-of-ransomware-attacks-against-uk-universities-experts-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 12, 2020

Comment: Upgraded Agent Tesla malware steals passwords from browsers, VPNs

Businesses should also consider moving away from their dependency on passwords.
Any malware with the capability of stealing passwords is very concerning given that they are traditionally a first line of defense for most websites and applications. It is even more concerning that they are able to steal passwords from VPNs which have become increasingly important in recent months for businesses functioning in the remote/hybrid working model ushered in by the COVID 19 pandemic. In order to prevent attackers from infiltrating deeper, both organisations and consumers alike need.....Read More
Any malware with the capability of stealing passwords is very concerning given that they are traditionally a first line of defense for most websites and applications. It is even more concerning that they are able to steal passwords from VPNs which have become increasingly important in recent months for businesses functioning in the remote/hybrid working model ushered in by the COVID 19 pandemic. In order to prevent attackers from infiltrating deeper, both organisations and consumers alike need to implement Multi-Factor Authentication (MFA). MFA Apps, hard tokens, biometrics, or one-time passwords prevent 99.9% of account takeovers and are instrumental if you want to defend against keyloggers. Businesses should also consider moving away from their dependency on passwords by taking advantage of the latest innovations in passwordless authentication.  Read Less
Like(2)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Businesses should also consider moving away from their dependency on passwords...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-upgraded-agent-tesla-malware-steals-passwords-from-browsers-vpns

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Businesses should also consider moving away from their dependency on passwords...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-upgraded-agent-tesla-malware-steals-passwords-from-browsers-vpns

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 29, 2020

Expert Insight On Hackers Are Creating Backdoor Accounts And Cookie Files On WordPress Sites Running OneTone

Considering that over 75 million sites use WordPress, it’s not surprising that it’s a prime target for hackers searching out vulnerabilities.
Considering that over 75 million sites use WordPress, it’s not surprising that it’s a prime target for hackers searching out vulnerabilities. At the moment, bad actors are targeting sites running the OneTone theme to exploit a vulnerability that allows them to create backdoor admin accounts or inject malicious code inside the theme’s settings. For organiations running multiple WordPress sites, they should prioritise work based on a risk assessment of the services offered by each exposed.....Read More
Considering that over 75 million sites use WordPress, it’s not surprising that it’s a prime target for hackers searching out vulnerabilities. At the moment, bad actors are targeting sites running the OneTone theme to exploit a vulnerability that allows them to create backdoor admin accounts or inject malicious code inside the theme’s settings. For organiations running multiple WordPress sites, they should prioritise work based on a risk assessment of the services offered by each exposed website, e.g. payment processing, authentication credentials and PII data. Keeping on top of security alerts and taking timely action in response to published vulnerabilities is vital. In addition, Multi-Factor Authentication (MFA) should be enforced across all applications to reduce the impact of attacks like this, particularly for administrator access.  Read Less
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Considering that over 75 million sites use WordPress, it’s not surprising that it’s a prime target for hackers searching out vulnerabilities...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-insight-on-hackers-are-creating-backdoor-accounts-and-cookie-files-on-wordpress-sites-running-onetone

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Considering that over 75 million sites use WordPress, it’s not surprising that it’s a prime target for hackers searching out vulnerabilities...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-insight-on-hackers-are-creating-backdoor-accounts-and-cookie-files-on-wordpress-sites-running-onetone

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 08, 2020

Email.it Data Breach Exposes 600,000 Users – Expert Commentary

The data now hosted on dark web forums will move into the cybercriminal supply chain.
This is of course a significant worry for users of Email.it, and for the company itself whose brand reputation and security posture will suffer as a result of this breach. They may also find themselves in breach of legislation such as GDPR, which could incur fines sizeable enough to have a serious affect on the company’s bottom line. Applying proactive measures such as two-factor authentication and other access controls as part of an enterprise’s standard privacy requirements can help to.....Read More
This is of course a significant worry for users of Email.it, and for the company itself whose brand reputation and security posture will suffer as a result of this breach. They may also find themselves in breach of legislation such as GDPR, which could incur fines sizeable enough to have a serious affect on the company’s bottom line. Applying proactive measures such as two-factor authentication and other access controls as part of an enterprise’s standard privacy requirements can help to stop or mitigate the harm caused by incidents such as this. The data now hosted on dark web forums will move into the cybercriminal supply chain, working as fuel for further breaches, phishing attacks, malware distribution, data harvesting and in the most extreme cases wholesale identity theft. Stopping these breaches at the source will work to stop the cycle starting again, but in the meantime, Email.it needs to assist every user affected by the breach, urging them to ensure they update their credentials on any websites where they have used the same password, enable two-factor authentication on as many websites as possible, and consider signing up for a free credit rating monitor service.  Read Less
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The data now hosted on dark web forums will move into the cybercriminal supply chain...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/email-it-data-breach-exposes-600000-users-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The data now hosted on dark web forums will move into the cybercriminal supply chain...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/email-it-data-breach-exposes-600000-users-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
March 06, 2020

Experts Insight On News: Virgin Media Data Breach Affects 900,000 People

Misconfiguration is a term used really to hide the fact baseline controls haven’t been put in place like privileged user access controls.
We are still seeing service providers failing to follow fundamental best practices to secure their customers’ data. The fact the data was accessed without the need for advanced hacking techniques using a misconfiguration that was in place for 10 months highlights how important it is to carry out regular security reviews of systems holding sensitive data, and to put in place access control monitoring and alerting. Any company holding personal data of millions of people should be protecting all .....Read More
We are still seeing service providers failing to follow fundamental best practices to secure their customers’ data. The fact the data was accessed without the need for advanced hacking techniques using a misconfiguration that was in place for 10 months highlights how important it is to carry out regular security reviews of systems holding sensitive data, and to put in place access control monitoring and alerting. Any company holding personal data of millions of people should be protecting all of their applications and databases using a central access control platform with strong multi-factor authentication rules in place. Access Control is fundamental to protecting systems and databases, its security 101. Misconfiguration is a term used really to hide the fact baseline controls haven’t been put in place like privileged user access controls.  Read Less
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Misconfiguration is a term used really to hide the fact baseline controls haven’t been put in place like privileged user access controls...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-news-virgin-media-data-breach-affects-900000-people

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Misconfiguration is a term used really to hide the fact baseline controls haven’t been put in place like privileged user access controls...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-news-virgin-media-data-breach-affects-900000-people

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 07, 2020

Philips Smart Lights Vulnerability Allows Hopping To Devices On The Network – Experts Advise

This latest IoT vulnerability highlights the critical need for robust security standards for IoT.
This latest IoT vulnerability highlights the critical need for robust security standards for IoT. Government’s must act now to hold IoT vendors to account for the security of their devices, and although the UK government recently proposed new legislation around IoT password management, it falls far short of the in-depth guidance and standards required to prevent hackers exploiting vulnerabilities like that found in the ZigBee protocol.
Like(0)  (0)

Linkedin Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This latest IoT vulnerability highlights the critical need for robust security standards for IoT. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/philips-smart-lights-vulnerability-allows-hopping-to-devices-on-the-network-experts-advise

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Stuart Sharp, VP of Solution Engineering, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This latest IoT vulnerability highlights the critical need for robust security standards for IoT. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/philips-smart-lights-vulnerability-allows-hopping-to-devices-on-the-network-experts-advise

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Matias Madou, Co-founder and CTO, Secure Code Warrior

"It’s imperative that all developers are trained in how to code securely from the outset. "

Expert On How The UK Police Data Loss Could Have Been Easily Prevented

Stephen Kapp, CTO and Founder, Cortex Insight

"Pixlr should look to improve its internal processes by holding user information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

George Glass, Head of Threat Intelligence, Redscan

"Gamarue is able to spread across a user’s local network and is also capable of installing additional strains of malware. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Jake Moore, Cybersecurity Specialist, ESET

"Gamarue.1 is an old virus from quite a few years ago. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"New and young students using online learning for the first time are most vulnerable. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"All computers, no matter the make, model, or operating system should run some type of antivirus or anti-malware protection. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Department of Education should be putting security parameters. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Sam Curry, Chief Security Officer, Cybereason

"The National Cyber Security Centre offer free advice on secure home working. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Brian Higgins, Security Specialist, Comparitech.com

"The potential for malicious software to be used against recipients is not limited to the children. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Chloé Messdaghi, VP of Strategy, Point3 Security

"The attack approach was also clever. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Saryu Nayyar, CEO, Gurucul

"Organizations still need to maintain strong perimeter and interior defenses. "

Cyber Criminals Left Stolen Phishing Credentials Exposed To Google Searches

Oliver Cronk, Chief IT Architect, EMEA, Tanium

"This story is part of a wider challenge facing schools at the moment. "

Cyber Expert On Malware Found On Laptops Provided By Government For Home-schooling

Andy Teichholz, Senior Industry Strategist, Compliance and Legal, OpenText

"In our new digital economy, people around the world are becoming acutely aware of how their information is being collected, stored, and used. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Lou Blatt, Senior Vice President and CMO, OpenText

"Digital is now central to almost every business interaction – generating more data for companies to manage and secure. "

OpenText Research Offers A Snapshot Of UK Attitudes Towards Data Privacy

Greg Bell, CEO, Corelight

"This type of network infiltration is often difficult to identify. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel