Security

10 ways to ensure your employees practice excellent security

This post was originally published here by casey pechan External cyber threats are a constant concern for business organizations. They dedicate teams to try to stay one step ahead of the latest ransomware or virus at any given time. However it can be easy to overlook one of the greatest risks to an organization’s security: employees. […]

SECURITY HEADLINES: BLACK HAT EDITION

This post was originally published here by  (ISC)² Management. We can’t all make it to Vegas for Black Hat, but we can get the scoop on what news came out of the annual infosec conference that took over the Mandalay Bay, and security headlines, for the week. So let’s dive into the top headlines from […]

Manufacturers of Medical Devices wake up to Cyber Security Threats

Companies which manufacture medical devices like pace makers, insulin pumps and glucose monitoring machines are sending their staff to cyber security conferences in order to learn from the researchers the latest in the world of cyber security. At the recently held Black hat Conference held in Las Vegas and the Def Con, representatives from big […]

SECURITY HEADLINES: IOT AND GOT

This post was originally published here by  (ISC)². From IoT to GoT, budget issues to interview busts, here are the top security headlines for the week of July 17, 2017: Who is a target for ransomware? Short answer: everyone. But education, government and healthcare organizations top the list. In math that doesn’t seem to add up, […]

Cisco predicts that future cyber attacks could have potential to destroy the Internet!

Cisco researchers predict that some countries might launch cyber attacks having the potential to destroy entire internet. The networking giant predicts that Russia already has such systems in place which can make countries suffer internet disruption for weeks and in some cases months. Therefore, Cisco through its 2017 Midyear Cybersecurity Report predicts that future cyber […]

Firms spending more than $100,000 for additional cloud security features

According to a survey conducted by B2B ratings and reviews offering company Clutch, companies nowadays prefer cloud platforms to store their critical business data. But at the same time, the survey revealed that companies are also spending more than $100,000 USD to protect their data in the cloud with extra security features. Clutch 2017 Annual […]

Symantec acquires Mobile Security Vendor Skycure

Symantec Corporation of America has made its second acquisition of this month official by disclosing to the media that it is acquiring Mobile Security Vendor Skycure for an undisclosed amount. As of now, terms of the deal are not disclosed. But sources reporting to Cybersecurity Insiders claim that Symantec could purchase the Tel Aviv-based Skycure […]

Oracle offers a dedicated and secure cloud platform for UK’s Government Agencies

Software giant Oracle has unveiled a Government Cloud Region for UK-based public sector organizations which have to comply with regulations around data security. Thus, the new cloud service will aim to help government organizations move their workloads to the cloud, ensuring they meet with HMG Cloud Security principles. At Oracle, security is at the heart […]

Microsoft offers a new playbook on Cloud Security

American software giant Microsoft has advocated a 228-page playbook in which it predicts that managed security services market is expected to reach nearly $41 billion on a global note in just next five years. The Security Practice Development Playbook of Microsoft views that that playbook will help all its partners to have a strong security […]

Macate steps into mobile market with a smartphone enriched with Cyber Security

Macate Group, an American multinational firm which designs, manufactures, and markets mobile communications and media devices with cyber security has announced the launch of the world’s first phone called ‘Genio’ into the mobile space of United Kingdom. Priced at £ 249, Genio will be the first smartphone to be commercially available with Advanced Encryption Standard […]

Share this page