mac_threats
Slider_JW
CISO_Data_Breach_Slider
Aiwatch__Banner_Article


Sednit

From Russia with Love: Sofacy/Sednit/APT28 Is in Town

October 31, 2014

Recently, another cyber espionage group with Russian roots made it to the New York Times headlines again courtesy of FireEye and a new report they published. more »

Leave a response »


security

1 in 8 Users Do Not Believe in Cyber Threats, Kaspersky Lab Survey Shows

October 31, 2014

According to a survey carried out jointly by B2B International and Kaspersky Lab, 13 percent of Internet users do not believe that cyber-attacks are real. more »

Leave a response »


cloud security

How Secure is Your Cloud?

October 31, 2014

In a recent survey of 200 IT managers in the UK, more than half agreed that there are significant threats to cloud computing. more »

Leave a response »


TouchID Fingerprint

Touch ID Fingerprint: Convenient, Secure, and a Password Replacement?

October 31, 2014

Since iOS 8 was made available last month, numerous organizations have jumped on the Touch ID fingerprint bandwagon and updated their applications with Touch ID support. more »

Leave a response »


data recovery

Best Security Practices for Data Recovery

October 30, 2014

Managing the risk of a data breach in today’s environment of mounting digital threats on assets and proprietary data is an ongoing battle for many businesses. more »

Leave a response »


ddos

How to Start Making a DDoS Response Plan

October 30, 2014

Some organizations exhibit strange behavior today when it comes to distributed denial of service (DDoS) attacks. more »

Leave a response »


security

Every Employee Needs to Understand Cyber Security Risks

October 30, 2014

A cyber security expert has told a House of Lords committee that a basic understanding of cyber security among all company employees is critical. more »

1 Comment »


missing data

More Efficient Data Back-Up Turns Employees into Sloppy Savers

October 30, 2014

A European study by information storage and management company Iron Mountain has discovered an unexpected downside to advanced data back-up and storage capability. more »

Leave a response »


apts

Majority of IT Security Professionals Still Naively Rely on Perimeter Security to Protect Against APTs

October 29, 2014

A new survey from Lieberman Software Corporation has revealed that 78 percent of IT security professionals are confident that firewalls and anti-malware tools are robust enough to combat today’s advanced persistent threats. more »

Leave a response »


data loss

Internal IT Threats Lead to Most Data Loss, According to Kaspersky Lab Survey

October 29, 2014

According to a global survey of IT professionals, 27 percent of all businesses have lost sensitive business data due to internal IT threats in the past 12 months. more »

Leave a response »


Sarah_Clarke

Don’t Cut Corners With Your Cloud

October 29, 2014

What are the main benefits & risks associated with using cloud applications? more »

Leave a response »


byod

Protecting Business-Sensitive Data in the BYOD Era

October 29, 2014

Mobile Device Management (MDM) in the Bring-Your-Own-Device (BYOD) era can be a complex issue for companies to navigate. more »

Leave a response »


defense in depth

Detect and Respond: Problems with Perimeter Defense

October 28, 2014

At a recent security and risk management conference, I had an opportunity to talk with industry analysts about today’s challenges in network security. more »

Leave a response »


breach

HP Launches Free Executive Breach Preparedness Tools to Reduce Impact of Cyber Security Incidents

October 28, 2014

HP has unveiled the results from a new study on the importance of senior executive involvement in a breach response plan and has released free online tools to help executives assess their organization’s current level of preparedness. more »

Leave a response »


web app security

Building a Better Web Application Security Practice

October 28, 2014

Web application security is hard. more »

Leave a response »


BYOD

Top Four BYOD Security Risk Prevention Tips

October 28, 2014

The BYOD trend is here to stay, with employers increasingly embracing its benefits, such as lower hardware costs, extended customer access to employees and staff satisfaction. more »

Leave a response »


Staples

Staples Investigates Breach – Expert Comments

October 27, 2014

Earlier this week, Staples announced that it is investigating a potential data breach at several of its northeastern-based stores. more »

Leave a response »


Charles Sweeney

Moving to the Cloud Extends a Company’s Threat Surface

October 27, 2014

What are the main benefits & risks associated with using cloud applications? more »

Leave a response »


ebola

Spam in September: Ebola in “Nigerian” letters

October 27, 2014

Spammers produced topical new versions of the old “Nigerian Letter” scam, this time based on the Ebola virus. more »

Leave a response »


shellshock

What You Need to Know About Shellshock

October 27, 2014

One of the most recent bugs affecting businesses and individuals is Shellshock. more »

Leave a response »

 

Welcome to Information Security Buzz

Information Security Buzz is an independent resource that provides the best blogs, opinions and news for the information security community. Collated from security experts and industry leaders, content is carefully selected to provide you with the latest threat trends, insights, practical solutions, hot topics and advice from around the globe. Get in touch and see how you can use our community as a catalyst to share your thoughts, views and to keep up to date with the latest news!

Email: infosec@informationsecuritybuzz.com or follow us on Facebook, Twitter & Google+ to find out more.