Pages

Friday 26 December 2014

Thursday 13 November 2014

Cisco warns of shortage in security professionals to fight online criminals

The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels. The report indicates a shortage of more than a million security professionals across the globe in 2014.

The sophistication of the technology and tactics used by online criminals have outpaced the

Use sentences as passwords, warns Finnish IT security expert

Thursday 14 August 2014

Cyber-Security Threats Rise in Frequency, Complexity

Web security and IT management All types of organizations are at risk of being targeted, but financial institutions top the list of the most at-risk businesses, Trend Micro found.
Cyber-threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014, with attacks affecting consumer’s personal information, included theft of data such as customer names, passwords, email addresses, home addresses, phone numbers, and dates of birth, according to a report from Trend Micro.
The data breaches and Distributed Denial of Service (DDoS) attacks recorded this quarter showed that an organization-wide strategy is required if companies wish to survive their aftermath.

Monday 30 June 2014

How to build trust between business and IT

One of the biggest challenges we face with securing our networks and systems is that many businesses view cyber security as an IT problem and not a business problem. However, when you consider how dependent businesses are on IT and, more importantly, on the information on those systems, it’s obvious that businesses need to realize cyber security really is a business issue. As information security professionals we need to realize that helping business leaders understand the threats posed by cyber security is a challenge

Friday 16 May 2014

The Ten Most Shocking Internet Security Breaches

If mother nature was a CISO: What the animal kingdom can teach us about IT security

If mother nature was a CISO: What the animal kingdom can teach us about IT security
If mother nature was a CISO: What the animal kingdom can teach us about IT security
21

People often describe the Internet as a hostile network — which is true — and that got me thinking about other hostile environments where a successful strategy results in resiliency and continuity. What if Mother Nature was the CISO? What would her strategy be? What strategy could she give the prey species so they could survive in the presence of many predators?
Albert Einstein was quoted as saying, “Look deep into nature, and then

Anti-DDoS servers used to launch DDoS attack

Friday 7 March 2014

New studies confirm IT security vulnerabilities

Just as we get word that giant retailer Target is completely reorganizing its IT security program in the wake of its massive data breach, two more security studies confirm the vulnerabilities that many organizations face.
In an email to FierceCIO, security firm SailPoint shared the results of its most recent study on how enterprises are embracing and in many cases mandating the use of cloud and mobile, and thereby

Hacking of defence ministry, DRDO computers may have led to leak of information