Data breaches make headlines, and continue to raise very justified concerns. It’s not just random hackers. Nor should we assume that corporations and high-tech firms are the ones at risk. The majority of data theft affects small businesses. Sensitive data like credit card numbers means relatively greater reward for less risk. Retailers with numerous POS systems transmitting data are especially vulnerable. The increasing use of cell phones as payment devices means another avenue of attack opening up to hackers.
To engage employees in IT security, they’re going to need to understand why it’s important. Simply telling them it’s important isn’t enough. Sure, everyone has a vague notion of what security is, and many – if pressed – would tell you it’s important.
2015 was fraught with high profile security breaches and highlights that no industry or organization is immune from attack. We have seen significant breaches in government (Office of Personnel Management), healthcare (Anthem and UCLA health), retailers (CVS) and telecom organizations (T-Mobile). Not even toy vendors are safe. VTech revealed that 5 million customers accounts in three-dozen countries were hacked, exposing personal data, chat logs and photographs of children who use its Internet-connected toys. With many experts expecting more of the same in 2016, why are these hacks increasing in scope and severity and what should enterprise security teams do to minimize their exposure?
with Chadd Kenney, Pure StorageIn this interview, Chad Kenney discusses how critical laying strategic foundational IT infrastructure is for success in the short-term and over the long haul. Read More >>>
Are you protecting the information that matters most? In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for security. For IT leaders, these security strategies for success are essential reading. Get started today.
Think You’re More Secure than Instagram? A Cyber Security Q&A with Dyadic Chief Scientist Yehuda LindellJanuary 29, 2016 No Comments
An independent security researcherwas recently able to infiltrate Instagram’s servers and gain access to essentially every secret key and server. The level of access he was able to achieve in a short amount of time is shocking: once he gained access to the company’s SSL certificates, private keys and administrator credentials, everything was open to him. He was able to access company assets, such as source code and internal emails, as well as private customer data, including personal details, login credentials and images.
by Dean Wiech, Tools4everWhile as a whole, the IAM market has been growing, there have been certain areas and solutions that have, in particular, shown great growth. What are these and why have organizations of all sizes been implementing them? Read More >>>
Equip yourself with knowledge of today’s enterprise cyberthreats and security best practices by downloading the All About Identity eBook.
While technology has benefited retailers in many ways, it has also contributed to growing levels of fraud. Although EMV and other developments are helping to curb identity theft fraud and unauthorized transactions, “chargeback fraud” remains a major threat to eCommerce merchants. As the technology of electronic payment processing becomes nearly ubiquitous in the business world, online shopping is rapidly overtaking in-store sales for many items. But with any fast-evolving system, scammers find loopholes that can eat deeply into profits.
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Digital transformation comprises all the changes occurring due to the application of digital technology in all aspects of society. BYOD, IoT, advanced cyber attacks – everything’s happening at an accelerated pace, and only the science fiction writers can guess what’s next on the horizon. One thing that is certain, though, is that the current proliferation of end points requires diamond-sharp clarity about which network solutions will provide a holistic, real-time view of the network.
Most of us remember the myth of the Trojan War, when the Greeks attempted to defeat the city of Troy. The battles lasted nearly 10 years. Then one day the Greeks appeared to retreat, leaving behind a huge wooden horse as a gift to the Trojans. The Trojan Horse was brought inside the city gates allowing the enclosed Greek warriors to infiltrate the city. The Greek warriors opened the city gates to allow the rest of their army to enter and defeat Troy.
451 Research: 44% of Enterprises will increase Information Security spending, but staffing obstacles hamper SIEM implementationsJanuary 7, 2016 No Comments
According to 451 Research’s new Voice of the Enterprise: Information Security quarterly study, more than 32% of the enterprises surveyed name Splunk as their primary Security Information and Event Management (SIEM) platform provider. In the 451 Research Vendor Window™, enterprises rated Splunk highest especially for querying capability and the ease of integrating new data feeds. Intel Security is the second highest rated vendor based on evaluations from its 380 existing customers.
Insurance is all about risk management. Like with any policy, a cyber security insurance policy is cheaper if you never have to use it. Unfortunately, in recent years, there has been a big uptick in cyber security attacks. This is pushing the cost of this type of insurance up dramatically and causing many insurance companies to cap coverage at $100 million.
By Joe McKendrick, Author and Independent ResearcherVerizon just released the latest edition of its annual Data Breach Investigations Report, and it reveals that most data security breaches don’t have to happen – yet, they still do keep on taking place. Read More >>>
Glorium Technologies knows that plenty of people are interested in what to wait for in the IT world in 2016. That’s why, we decided to prepare infographic based upon Spicework report. Enjoy!
with Maureen Polte, Flexera SoftwareIn this interview, Maureen Polte from Flexera Software discusses why it’s important for enterprises to understand the risky behaviors associated with mobile apps that could compromise data security in today’s BYOD environment. Read More >>>
Keeping the Connected Car Safe from Today’s Most Malicious Cyber Breaches: the Attacks and Defense OEMs Need to KnowDecember 17, 2015 No Comments
The demand to stay connected while driving is steadily growing and car manufacturers are keen to provide better and more innovative connected services to differentiate their brands and stay ahead of the competition. This is a global phenomenon, especially with Gen-Y car buyers who are used to a digitally connected lifestyle. In fact, some research indicates that a quarter billion of cars will be connected to the internet by 2020 (source: Gartner).
Wireless network is a valuable asset to a business that embraces the technology. It is, indeed, inexpensive and easy to set up and operate. The wireless network has undoubtedly increased enterprises’ performance and productivity. By having a central point of distribution, that entails the installation of a wireless adapter, a business can access the network from any part within the premises. Sharing of documents and hardware components such as printers, scanners, and photocopiers become a very smooth and efficient process. All the clutter and nightmare that comes with physically connecting all the computers and their peripherals is made almost non-existent, except for the few power cable needed here and there.
The $400 million of estimated losses from the 700 million records compromised in 2014, detailed in Verizon’s 2015 Data Breach Investigations Report, sends a collective shudder down the spines of organizations’ C-suites and IT departments. If, after creating what seems like a foolproof security strategy, the organization suffers a breach, the focus of attention oftentimes goes not to how the breach occurred but to who did it. Money and reputation are about to be lost, and someone is to blame.
Download this simple guide to protect your entire business when an outage occurs.
Access is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Being able to properly control access means the difference between a breach and brand reputation. These days, access is about more than just network passwords. It extends well beyond the borders of the enterprise. Global supply chains are increasingly complex. The global supply chain is intertwined intimately, and it doesn’t seem it will unravel itself anytime soon.
IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of EverythingDecember 2, 2015 No Comments
with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>
This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.
As the holiday shopping season approaches, the American Bankers Association is educating consumers about the new chip technology embedded in many credit and debit cards. The new chip cards offers bank customers an added layer of security just in time for the holidays. The chip – a small metallic square on the front of the payment card – assigns a one-time code for each transaction, and makes it nearly impossible for fraudsters to create counterfeit cards.
Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go.
Chip and PIN cards are nothing new. For several years, retailers in Europe have accepted the cards, which transmit information about the transaction to the payment processor, including the card number and account details, via a secure token or one-time use code. These codes are practically useless to hackers, thereby protecting credit card users from having their financial data stolen. The cards themselves contain a chip, which when inserted into a special reader, makes the conversion; in order to complete the transaction, the customer must enter a PIN, instead of a signature.
Nikhil Premanandan, ManageEngineIn this interview, Nikhil Premanandan from ManageEngine discusses the importance of notifying DBAs the moment any anomalous activity is detected and finding the root cause, enabling a faster threat mitigation response. Read More >>>