Security
How to run configuration security monitoring scans with Halo
This post was originally published here by leslie devlin. Building off our first configuration security monitoring (CSM) tutorial, today we’re diving into how to run a CSM scan in the Halo interface and examine the results. If you followed the above link, you will notice that our previous explainer video showed you how to clone a […]
Sony to revolutionize Mobile Security technology with Facial Recognition
Facial Recognition, a technology mostly used in the industry of security surveillance will from now on be used as a mobile security feature. Yes, this is possible in near future as Sony has announced that it is developing a facial recognition solution for smartphones which is set to revolutionize the mobile security field in coming […]
A rundown on the top Five Mobile Security Threats
Mobile Security has become a prime concern for IT professionals working for enterprise businesses. The reason, businesses are turning less vigilant when it comes to mobile security while embracing the trend of BYOD. Very recently, Chris Crowley, a security instructor working for SANS Institute offered a rundown on the top mobile security threats lurking behind […]
Poor cloud security practices led to the leak of RNC Voter Database
Cloud Security practiced carelessly is said to have led to the leak of RNC Voter database. A researcher from the UpGuard Cyber Risk team confirmed this news and also stated that the leak could have been prevented if proper cyber security skills were practiced. UpGuard research discovered that Republican National Committee’s voter database info which […]
Increase in Cloud Adoption surges Cloud Security Concerns
Gartner in its latest report has predicted that the cloud security market on a global note will remain strong in coming years. And that will be due to the increase in the market for cloud adoption. On a further note, the world-renowned research firm predicts that the market will reach $5.9 billion USD by 2017, […]
Schools in Florida turn extremely vulnerable to Cyber Attacks
Florida-based School Networks are extremely vulnerable to cyber attacks, says a research study made by United Data Technologies. The Doral-based cyber security firm also confirmed that at least 4 Florida school district networks were hacked by cyber crooks to slip into other sensitive government systems, including state voting systems just before the US 2016 Polls. […]
Do more CISOs mean a greater focus on security concerns?
This post was originally published here by shaane syed. In early 2016 the percentage of enterprise organizations with Chief Information Security Officers (CISOs) in their C-Suites stood at 50%. In early 2017 that number has already leapt to 65%, representing a 30% increase in just a single year. This seems to indicate organizations are truly […]
Wipro research says 1 out of every 2 cyber attacks saw Password Breach
Wipro, the Asia-based IT giant recently conducted a research on cyber attacks and came to a conclusion that 1 out of every 2 cyber attacks witnessed a password breach. The Cybersecurity Report of 2017 released by Wipro says that 56% of breaches were related to passwords implying that further damage could be committed by hackers […]
US NSA links Wannacry Ransomware cyber attack to North Korea
The National Security Agency of United States has linked Pyongyang to the recent outbreak of Wannacry Ransomware cyber attack which affected more than 200,000 computers across 150 countries. The American security agency confirmed that a hackers group named Hidden Cobra was behind the ransomware attack launched on May 12th, 2017. The security agency also validated […]
Foscam USA issues a cyber security alert to all its users
Chinese company Foscam has warned all its remote controlled CCTV camera users about a flaw which when exploited by hackers can pave the way to cyber espionage. In an email notice sent by Foscam USA, a subsidiary of Foscam Intelligent Technology Co. LTD, the company specified that 12 models of its cameras contain security flaws […]