cyber security

cyber security news search results

Developer news items we found relating to cyber security

27 results
Acronis-gives-developers-early-access-to-new-cyber-platform

Acronis gives developers early access to new cyber platform


Monday, April 29, 2019 by

Acronis announced the opening of its core platforms, enabling broad, third-party developer access to the Acronis Cyber Platform to encourage expanded functionality and application integrations while expanding their opportunities in Acronis’ large ecosystem. The Acronis Cyber Platform, which is the foundation of the company’s existing services, features a ...


UN-commission-sets-cyber-security-regulations-for-Europe

UN commission sets cyber security regulations for Europe


Wednesday, January 9, 2019 by

The United Nations Economic Commission for Europe (UNECE) has confirmed it will integrate the widely used ISA/IEC 62443 series of standards into its forthcoming Common Regulatory Framework on Cybersecurity (CRF). The CRF will serve as an official UN policy position statement for Europe. At its recent annual meeting in Geneva, UNECE’s Working Party on Regulatory...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


DevSecOps-is-important-and-here-is-why

DevSecOps is important and here is why


Friday, October 20, 2017 by

In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...


Metadata-can-be-deadly-in-cyber-exploitation

Metadata can be deadly in cyber exploitation


Tuesday, July 18, 2017 by

When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...


Protect-against-Wannacry-with-help-from-this-free-course

Protect against Wannacry with help from this free course


Friday, May 19, 2017 by

Alison has released a new course to teach people about the recent WannaCry global virus threat.The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus, it maliciously gains access to computer systems, locking down and making inaccessible to you and others your private information and data, then r...


A-DevOps-framework-for-federal-customers

A DevOps framework for federal customers


Wednesday, May 17, 2017 by

Last Thursday, President Trump signed an executive order designed to strengthen the cybersecurity of federal networks including moving all federal IT systems to the cloud. The executive order also calls for effective risk management, which includes requiring planning so that maintenance, improvements and modernization occur in a coordinated way and with appropriate regu...


The-Netflix-hack:-A-chat-about-securing-your-company

The Netflix hack: A chat about securing your company


Wednesday, May 10, 2017 by

As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...


NoTrove-threat-is-delivering-millions-of-scam-ads

NoTrove threat is delivering millions of scam ads


Friday, April 28, 2017 by

Earlier this year, RiskIQ, a digital threat management company, reported an eight-fold increase in internet scam incidents that deny the $83 billion digital advertising industry millions of dollars. Now, researchers at RiskIQ have identified NoTrove, a newly discovered and major threat actor that is delivering millions of scam ads that threaten consumers and further und...


VPNs-will-not-protect-your-privacy-but-this-might

VPNs will not protect your privacy but this might


Monday, April 10, 2017 by

Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...


What-works-best-with-IoT-devices:-hardware-vs-software-presentation

What works best with IoT devices: hardware vs software presentation


Thursday, March 2, 2017 by

Icon Labs, a provider of security solutions for IoT and edge devices, has announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe. Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secur...


IBM-Watson-for-cyber-security-has-cognitive-skills

IBM Watson for cyber security has cognitive skills


Monday, February 13, 2017 by

According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Ransomware-facts-and-the-steps-to-prevent-it-on-your-device

Ransomware facts and the steps to prevent it on your device


Friday, December 30, 2016 by

As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in Asia-Pacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


How-to-secure-your-online-accounts-from-cyber-attacks-in-2017

How to secure your online accounts from cyber attacks in 2017


Wednesday, December 21, 2016 by

In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...


Cyberbit

Cyberbit's SOC 3D automation updates and what you should know


Tuesday, December 20, 2016 by

Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...


Tufin-extends-Check-Point-R80-security-management

Tufin extends Check Point R80 security management


Monday, December 19, 2016 by

Tufin, a network security policy orchestration solutions, has announced support for Check Point R80 Security Management, delivering end-to-end change automation and continuous policy compliance for joint customers across hybrid networks. With Tufin, Check Point users who are currently deploying or plan to deploy R80 Security Management can extend the benefits of consoli...


Humans-are-still-the-biggest-threat-to-cyber-security-report-shows

Humans are still the biggest threat to cyber security report shows


Saturday, December 17, 2016 by

Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...


Paving-the-way-to-smarter-phone-security

Paving the way to smarter phone security


Wednesday, October 19, 2016 by

75 million Smartphone users admit that while they are afraid of cyber attacks, they have not set a password for their smartphones according to the latest TransUnion’s Cyber Security Survey. While at first glance, this seems completely alarming and the ramifications could result in identity theft, it is also not surprising as consumers are not technologists and they just...


IoT-Tech-Expo-descending-on-Silicon-Valley-next-week-(October-20-21st)

IoT Tech Expo descending on Silicon Valley next week (October 20-21st)


Friday, October 14, 2016 by

The IoT Tech Expo will be descending on Silicon Valley for 2 days (October 20-21st) of top-level content, discussion, case studies, live demos, workshops and plenty of networking opportunities. There will be 8 conference tracks, an exclusive Samsung Workshop, IoT hackathon and a vast exhibition including robotics, 3D pizza printers, drones, mind-reading tech and more! O...


DBmaestro-Adds-CyberArk-Integration-for-Privileged-Credentials

DBmaestro Adds CyberArk Integration for Privileged Credentials


Thursday, March 17, 2016 by

DBmaestro has announced that its DevOps for database solutions platform now offers a technology integration with the CyberArk Privileged Account Security Solution to offer security and compliance in DevOps environments by allowing DBmaestro to secure privileged access.DBmaestro’s TeamWork Oracle solution now integrates with CyberArk Application Identity Manager enabling...


New-Security-Report-Reveals-Increased-Threat-for-Mobile-Applications-

New Security Report Reveals Increased Threat for Mobile Applications


Sunday, February 21, 2016 by

According to a new cyber security report, mobile applications increasingly have become top security threats plaguing enterprises over the past year. The details are outlined in the recently published Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016.As the company points out in the report, traditional network perimeters are disappearing allowing attack surfaces to...


Security-Startup-Provider-buguroo-Launches-New-Threat-Intelligence-Platform

Security Startup Provider buguroo Launches New Threat Intelligence Platform


Wednesday, February 17, 2016 by

Security provider buguroo, a U.S. startup and spinoff of Deloitte’s European Security Operations Center (SOC), is launching bugThreats, a threat intelligence platform (TIP) that looks outside the enterprise infrastructure and focuses on useful intelligence gathered where the compromised end users, and their stolen data, are.Focused on intelligence and not protection, bu...


New-iSheriff-Complete-Platform-Offers-a-Cloud-Based-Cyber-Security-Platform

New iSheriff Complete Platform Offers a Cloud Based Cyber Security Platform


Tuesday, February 2, 2016 by

Cloud security provider iSheriff has released iSheriff Complete, a cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels. iSheriff Complete is a cloud based platform that provides fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set...


Consumer-Adoption-Could-Drive-IoT-Initiatives

Consumer Adoption Could Drive IoT Initiatives


Saturday, June 13, 2015 by

ThroughTek, a cloud-based platform for Machine-to-Machine (M2M) and Internet of Things (IoT) industry operations provider, has announced findings from its “2015 Internet of Challenges Report” around consumer adoption and identified challenges regarding the Internet of Things (IoT). The online survey was taken in May 2015 and included 1,181 adults. The figures have been ...


An-Analysis-of-the-Starbucks-Cyber-Attack-and-How-To-Stay-Protected

An Analysis of the Starbucks Cyber Attack and How To Stay Protected


Wednesday, June 10, 2015 by

How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement  denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...