NAUGHTY SECURITY CORNER

Do you trust your data in Public Cloud?

    RECENT POSTS

    Cloud application control

    Is Cloud Application Control the silver lining that any next generation web security solution needs?

    The proliferation of Bring Your Own Device (BYOD) within the modern business environment was as much a matter of timing as anything else. The growth in employee owned devices dovetailed with the global financial crisis. Businesses looking to reduce their overall capex costs therefore encouraged the trend as the cost of purchase, replacement and general day-to-day management of … [Read More...]

    Obama executive order sanction cyber security

    Our Path To Strong Consumer Authentication Regulation

    Recently, Obama issued an executive order that places economic sanctions on individuals or group cyber attackers that aim to threaten US national security or economic activity. The order comes on the heels of a momentous year for malicious cyber crime—A report by PricewaterhouseCoopers found that the number of detected cyber attacks skyrocketed in 2014—up 48% from 2013. The … [Read More...]

    Comments on Verizon data Breach

    Security expert Comments on Verizon Data Breach Report

    Márton Illé, security evangelist for BalaBit IT Security, reviewed the new 2015 Verizon Data Breach Investigations Report and made the following observations.Márton Illé, security evangelist, BalaBit IT Security:The annual Verizon Data Breach Investigations Report is out and it is worth giving it a go to learn from the lessons of our unlucky fellows in 2014. In many … [Read More...]

    File sharing strategy

    Why CIO’s Must Act Now to Rescue Their File Share Strategies

    CIO’s today are faced with a dilemma. On one hand more and more data is moving to the cloud. Increasing numbers of corporate users are demanding better ways to access, store, manage and share their data with others across multiple devices. But on the other hand, public cloud services like Dropbox that make this possible can have major drawbacks for IT teams in terms of privacy, … [Read More...]

    Survey on cloud applications

    15.1% of European organisations have over 1,000 cloud apps

    European organisations have an average of 511 cloud apps; an average which rises to 730 at a global levelCompromised credentials continue to haunt cloud app usage: 13.6 percent of enterprise users have had their log-in details compromised 70 percent of uploads to cloud apps by people with compromised accounts are to apps rated “poor” in terms of … [Read More...]

    ATTACKERS ARE BYPASSING PERIMETER

    Attackers are Bypassing Perimeter Detection Methods With Relative Ease According To Survey

    More IT Professionals are Operating Under the Assumption of Compromise More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute on the behalf of Guidance Software. Fifty-six percent of those surveyed assume that they have been breached or will be soon compared with … [Read More...]

    malware family infecting retailers

    New Research Malware Family infecting Retailers

    During a law enforcement investigation, Trustwave encountered malware with similarities to the NewPOSthings family of malware first discovered by Dennis Schwarz and Dave Loftus at Arbornetworks. While this malware shares some commonalities with that family, this malware departs from the standard operating procedure of the previous versions rather dramatically.  We have named … [Read More...]

    Information Security Study

    Expert Comments On CompTIA

    Comments on the recent survey from CompTIA showing that human error is responsible for 52 percent of security breaches, and that “human error…is a problem without an obvious solution” Nathan Wenzler, Senior Technology Evangelist at Thycotic, who disagrees with the point made in this CompTIA report that employee training is the only solution to mitigate human-error related … [Read More...]

    TV5Monde suffers attack

    Comments on TV5Monde suffers attack

    David Emm, principal security researcher at Kaspersky Lab commented on news that French TV network, TV5Monde has suffered a cyberattack,and also discussing how these types of threats are on the rise. “This is another example of the threats posed by hacktivism. Stealing money or confidential data is not the only motive behind attacks - sometimes the purpose of an attack is to … [Read More...]

    ARgon for Email

    ARgon for Email – The Elemental Approach to Data Loss Prevention

    Clearswift, the global cyber security innovator, launches ARgon for Email, a world first adaptive data loss prevention (DLP) solution. ARgon is powered by Clearswift’s unique, award-winning Adaptive Redaction (AR) technology enabling organisations to easily implement adaptive DLP functionality within their existing email security infrastructure, reducing risk from next … [Read More...]

    AlienVault Beta Version

    Announcing Beta Version of Open Threat Exchange 2.0

    Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily AlienVault™, the leading provider of Unified Security Management™ and crowd-sourced threat intelligence, today announced the beta release of Open Threat Exchange™ (OTX) 2.0. … [Read More...]

    Sheds Light on Emerging Security Risks

    Annual Threat Report Sheds Light on Emerging Security Risks

    Dell  announced the results of its annual Threat Report, which leverages research from Dell’s Global Response Intelligence Defense (GRID) network and telemetry data from Dell SonicWALL network traffic to identify emerging threats and equip organizations of all sizes with insights to improve their security posture. … [Read More...]

    Welcome to Information Security Buzz

    Information Security Buzz is an independent resource that provides the best blogs, opinions and news for the information security community. Collated from security experts and industry leaders, content is carefully selected to provide you with the latest threat trends, insights, practical solutions, hot topics and advice from around the globe. Get in touch and see how you can use our community as a catalyst to share your thoughts, views and to keep up to date with the latest news!

    Email: infosec@informationsecuritybuzz.com or follow us on Facebook, Twitter & Google+ to find out more.