Kai_Slider
anonymous-rain-l
css_code
infoGheader_webBrowserSpeed


iPhone 6 Secure Smart Phone

4 Ways the iPhone 6 Is the Most Secure Smartphone

March 6, 2015

Our phones are our lives. Although most of us don’t want to admit it, for almost all of us it’s true. We depend on our phones for almost everything and keep personal information inside, including text messages, emails, pictures, videos and documents. more »

Leave a response »


Protiviti Survey

Cybersecurity Awareness Top of Mind for Internal Auditors, Protiviti Survey Finds

March 6, 2015

Board engagement and the audit plan are keys to addressing cyber risks effectively

According to From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions, a new survey report released today by global consulting firm Protiviti, internal audit professionals are making strides in meeting cybersecurity and data privacy standards. more »

Leave a response »


High price online data

£1m – The Sky-High Price That People Put On Their Online Data

March 6, 2015

Almost half of the UK population would not sell their online data[1] for less than £1m, according to a landmark new privacy study, even though many people are failing to take even the most basic steps to secure their information. more »

Leave a response »


SSO

AVG Technologies Launches Secure Sign-On for Service Providers and Small Businesses

March 6, 2015

AVG Technologies N.V. (NYSE: AVG), the online security company for 197 million active users, announced the immediate availability of AVG Business Secure Sign-On (SSO). Underpinned by technology from identity management leader, Centrify, AVG Business SSO works to provide AVG partners and business owners with a simple way to control company data on employees’ mobile devices and cloud applications. more »

Comments are closed


Security Breaches and silicon valley

Silicon Valley Doesn’t Lead Breach Prevention. But It Should

March 5, 2015

As the undisputed global leader in technological innovation, it has always been shocking to me that Silicon Valley doesn’t lead the nation in cyber security best practices. more »

Leave a response »


firewall

Firewalls: The Once and Future King of Network Security

March 5, 2015

FireMon, the industry leader in proactive security intelligence solutions, announced a new report that reinforces the firewall’s role as a foundational element of network security infrastructure, both today and in the future. more »

Leave a response »


Claus Cramon Houmann

Global Awareness Training to Combat IoT’s Insecurity

March 5, 2015

What are the main benefits & risks associated with ‘Internet of Things (LoT)’ ? more »

Leave a response »


mobile games hacking

Arxan Announces Mobile Game Security Support for All Major Mobile Platforms

March 5, 2015

Arxan Technologies, the leading provider of application protection solutions, announced that its mobile game security support is now available across all major mobile platforms (Android®, iOS®, Windows Phone Series®, etc.). more »

Leave a response »


overseas shipping

Managing the Cyber risk to the global shipping industry Part I

March 4, 2015

The global shipping industry is the enabler of globalization itself. Without it, it would not have been possible for you to read this post (the smartphone or tablet you are reading this on was likely made in China and shipped to your location onboard a container ship), eat Sushi for lunch (frozen Salmon shipped from the North Sea) or enjoy any other imaginable cheap commodity. more »

Comments are closed


Ransom Malware

Ransomware – No Sign of Relief, Especially for Australians

March 4, 2015

Websense® Security Labs™ researchers observed that ransomware was a plague in 2014 and this threat type shows no sign of relief in 2015.  In this blog we profile the user experience for a Torrentlocker variant focusing on the Australian region. more »

Leave a response »


enterprise security

BMC and Qualys Join Forces to Improve Enterprise Security

March 4, 2015

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams. more »

Leave a response »


sonar application

Mobile Productivity and Security with Soonr Go

March 4, 2015

As we work more frequently on the road, our mobile devices are fast becoming the first tool we turn to. Not just to check email, but to access files, make document changes or share important content with others.  So when we work while mobile, it’s important to think about how to not only maintain productivity while doing so in a secure way so business data is never compromised. more »

Comments are closed


trading algorithm

Experts Comment on Cyberattacks Targeting Fund Trading Algorithms

March 3, 2015

Reports are emerging that cyber criminals are attacking and stealing in-house trading algorithms/code. According to the Financial Times, security company Kroll has observed three recent cases, said Ernest Hilbert, head of cyber investigations for Europe, the Middle East and Africa. more »

Leave a response »


data breaches

Security Guide: Limiting The Damage From Data Breaches

March 3, 2015

“There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked.” – John Chambers, CEO, Cisco more »

Leave a response »


website tracking

Is Your Favourite Website Spying On You?

March 3, 2015

Do you think that your favourite website spying on you? Every time we browse the web we leave behind a digital trail of choices, likes and locations. Tracking this footprint has become a pervasive, lucrative and controversial business. Our infographic analyses how websites track us and offers practical advice to follow. more »

Leave a response »


sdn and security threats

Security Threats to Software Defined Network (SDN)

March 3, 2015

In Software Defined Network (SDN) architecture, the control plane is separated from the data plane and implemented in a software application. In this blog, we will briefly analyze the security threats to SDN because of this decoupling. The controller is the most vital component in SDN architecture mainly because it defines the data flows that occur in the Data Plane (traffic flow manager). more »

Leave a response »


threat intelligence

The Year of Threat Intelligence Sharing: Bringing Structure to the Chaos of Big Security Data

March 2, 2015

As we kick off 2015, I predict that this will go down in history as the year of the Threat Intelligence Platform (TIP). more »

Leave a response »


sex points security checks

6 Point Security Check

March 2, 2015

Many companies feel overwhelmed with the burden of covering all aspects of IT security, since growing network structures and factors — such as device proliferation and an increasingly mobile workforce — mean there are a greater number of systems and end-points that need to be secured than ever before. more »

Leave a response »


mobility index report

Good Technology Q4 Mobility Index Report Shines Spotlight on the Need for Increased Enterprise Cyber Resiliency

March 2, 2015

10x increase of secure browser activations and 9x increase of secure instant messaging activations in 2014 highlight shift to secure apps in the enterprise. more »

Leave a response »


file sharing

Demand for Easy Content Management Validated by Box IPO, But Concerns Linger About Unregulated File Share Use

March 2, 2015

There’s no question that the Box IPO has validated the market demand for simple ways to share and collaborate on content. more »

Leave a response »

 

Welcome to Information Security Buzz

Information Security Buzz is an independent resource that provides the best blogs, opinions and news for the information security community. Collated from security experts and industry leaders, content is carefully selected to provide you with the latest threat trends, insights, practical solutions, hot topics and advice from around the globe. Get in touch and see how you can use our community as a catalyst to share your thoughts, views and to keep up to date with the latest news!

Email: infosec@informationsecuritybuzz.com or follow us on Facebook, Twitter & Google+ to find out more.