Author Archives: The Cyber Security Place

Top 5 Questions to Ask Your Managed Security Services Provider

There is no shortage of spend or need on security services. Gartner has recently predicted that worldwide spend on security products and services will reach $124 billion in 2019. This coupled with

The post Top 5 Questions to Ask Your Managed Security Services Provider appeared first on The Cyber Security Place.

Application Security and Software Development

Due to faster connectivity and the lower barriers to application development with open source software, the amount of applications and data held by organizations has continued to grow. As a

The post Application Security and Software Development appeared first on The Cyber Security Place.

Quantum Cryptography: The next-generation of secure data transmission

Quantum cryptography is secure from all future advances in mathematics and computing, including from the number-crunching abilities of a quantum computer. Data proliferation continues to take place at an ever-accelerating

The post Quantum Cryptography: The next-generation of secure data transmission appeared first on The Cyber Security Place.

10 Tips for Protecting Your Company’s Data Against Insider Threats in 2019

Perhaps because of their incredible scope or their shocking prevalence, data breaches are creating a lot of buzz right now. It seems that a new event happens every week, and

The post 10 Tips for Protecting Your Company’s Data Against Insider Threats in 2019 appeared first on The Cyber Security Place.

Crypto-agility: the key to ensuring long term website security

Scott Carter, Senior Manager – US, Venafi, discusses the distrust of Symantec’s certificate authority and how this represents a wider problem in the industry as a number of CA’s have

The post Crypto-agility: the key to ensuring long term website security appeared first on The Cyber Security Place.

Android Malware Steals from PayPal Accounts

What happens when you combine a remotely controlled banking Trojan with an abuse of Android Accessibility services? According to new research from ESET, you get an Android Trojan that steals money from

The post Android Malware Steals from PayPal Accounts appeared first on The Cyber Security Place.

A New Year’s Resolution: Security is Broken…Let’s Fix It

As we near the end of 2018, another wave of massive cyber-attacks has exposed personally identifiable information belonging to hundreds of millions of people and will cost the impacted businesses

The post A New Year’s Resolution: Security is Broken…Let’s Fix It appeared first on The Cyber Security Place.

Cybersecurity Tools That Every Business Should Consider in 2019

Businesses ignoring cyber security has become a thing of the past. With the sudden increase in cyber-attacks and data breaches, cybersecurity remains at the front of many business leaders’ minds.

The post Cybersecurity Tools That Every Business Should Consider in 2019 appeared first on The Cyber Security Place.

Bug Hunting Is Cybersecurity’s Skill of the Future

The vast majority of white hat hackers who reported that they were looking for jobs in cybersecurity said that their bug hunting experience helped them land a job, according to Bugcrowd’s 2018

The post Bug Hunting Is Cybersecurity’s Skill of the Future appeared first on The Cyber Security Place.

AI Set to Supercharge Phishing in 2019

The coming year will see a mix of old and new as phishing is supercharged with AI but reported vulnerabilities continue to cause organizations problems, according to Trend Micro. The security

The post AI Set to Supercharge Phishing in 2019 appeared first on The Cyber Security Place.

10 cyber security trends to look out for in 2019

2018 was an interesting year for all things cyber.  It was the year that brought major breaches pretty much every week. Most recently, the Marriott Hotel group suffered a significant

The post 10 cyber security trends to look out for in 2019 appeared first on The Cyber Security Place.

Why the CISO’s Voice Must be Heard Beyond the IT Department

In a recent company board strategy meeting the CFO presented the financial forecast and outcome and made some interesting comments about fiscal risks and opportunities on the horizon. The COO

The post Why the CISO’s Voice Must be Heard Beyond the IT Department appeared first on The Cyber Security Place.

Privacy a Key Concern for Telecoms and Consumers

Two recently published surveys about the telecom industry revealed that privacy as it relates to security and the internet of things (IoT) has become a top concern for both businesses

The post Privacy a Key Concern for Telecoms and Consumers appeared first on The Cyber Security Place.

#2018InReview Security Culture

Companies understand that organizational culture is an important differentiator to set their company apart from the competition. However, joining the dots between culture and information security management has taken some

The post #2018InReview Security Culture appeared first on The Cyber Security Place.

Securing industrial control systems by closing the air gap security loophole

Air-gapping is one of the most common ways ICS are protected, however, organisations’ interpretation of how to isolate networks often varies.Security and industry experts have long advocated for the need

The post Securing industrial control systems by closing the air gap security loophole appeared first on The Cyber Security Place.

Ransomware’s Importance to Small and Midsized Businesses (SMBs)

Ransomware is something that many small and midsized businesses (SMBs) need to watch out for. It’s not just for the big companies anymore. Many smart SMBs know that data is

The post Ransomware’s Importance to Small and Midsized Businesses (SMBs) appeared first on The Cyber Security Place.

Cyber risk management continues to grow more difficult

New research shows that cyber risk management is more difficult now than it was two years ago. Primary causes include increasing workloads, sophisticated threats, and more demanding business executives.Cyber risk

The post Cyber risk management continues to grow more difficult appeared first on The Cyber Security Place.

Are Lawyers the Best Judge of Cybersecurity?

I had to do a double-take when I read that Japan’s deputy chief of government cybersecurity strategy, Yoshitaka Sakurada said he has never used a computer. That pretty quickly became a

The post Are Lawyers the Best Judge of Cybersecurity? appeared first on The Cyber Security Place.

Healthcare Cybersecurity

The healthcare industry is one of the biggest targets for hackers and other bad actors, given the massive amount of personal data these organizations have in their possession and the

The post Healthcare Cybersecurity appeared first on The Cyber Security Place.

Hacked Without a Trace: The Threat of Fileless Malware

Malware. The word alone makes us all cringe as we instantly relate it to something malicious happening on our computers or devices. Gone are the days when we thought the

The post Hacked Without a Trace: The Threat of Fileless Malware appeared first on The Cyber Security Place.

Cybersecurity Threats Keep Evolving, Research Shows

Cybersecurity industry research is a great way to stay on top of the latest threats — and the controls that can keep those vulnerabilities from affecting your organization. Research released

The post Cybersecurity Threats Keep Evolving, Research Shows appeared first on The Cyber Security Place.

AI in cyber security: a help or a hindrance?

AI has the possibility of being deployed by both sides: those looking to attack and those looking to defend.With a disappearing IT perimeter, a widening skills gap and the increasing sophistication

The post AI in cyber security: a help or a hindrance? appeared first on The Cyber Security Place.

C-Suite: GDPR Could Lead to Greater Risk of Breaches

Almost a quarter of UK and German businesses (23%) believe the GDPR may have resulted in a greater risk of data breaches, six months after the legislation was introduced.  The

The post C-Suite: GDPR Could Lead to Greater Risk of Breaches appeared first on The Cyber Security Place.

The Importance of “S” in “CISO”

A Chief Information Security Officer is the brigadier general of the security force of an organization. While the c-suite normally looks at the financial and overall management of an organization,

The post The Importance of “S” in “CISO” appeared first on The Cyber Security Place.

How Corporate Boards Can Be More Proactive Mitigating Cyber Risks

Many corporate boards have made significant progress about understanding the importance of cyber security to the competitive health and sustainability of the companies they oversee. They’ve certainly gotten the message

The post How Corporate Boards Can Be More Proactive Mitigating Cyber Risks appeared first on The Cyber Security Place.

Red-hot cyber: 5 cyber security startups next in line for the Unicorn Crown

Following the warning from MPs that the UK is ‘wholly’ unprepared to stop a devastating cyber attack, Information Age looks at the top cyber security start-ups. With big-tech companies looking

The post Red-hot cyber: 5 cyber security startups next in line for the Unicorn Crown appeared first on The Cyber Security Place.

Who’s the Weakest Link in Your Supply Chain?

Nearly 60% of organizations have suffered data breaches resulting from a third party, as suppliers pose a growing risk to enterprise security. Do you know how many third parties your

The post Who’s the Weakest Link in Your Supply Chain? appeared first on The Cyber Security Place.

Online Shopping Safety Tips For The Holidays

The holidays are just around the corner and the rush to purchase gifts online is well under way. While retailers scramble to create eye-catching promotions, deep in the underground, the

The post Online Shopping Safety Tips For The Holidays appeared first on The Cyber Security Place.

What is the challenge in embracing multi-factor authentication?

Only 20% of IBM mainframe customers are embracing multi-factor authentication to protect data and applications, according to findings from a new poll of 81 mainframe users conducted by Macro 4

The post What is the challenge in embracing multi-factor authentication? appeared first on The Cyber Security Place.

Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data

Phishing is fast becoming malware’s favorite vector, proving to be incredibly pervasive with 76 percent of businesses having reported to being a victim of a phishing attack in the last

The post Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data appeared first on The Cyber Security Place.

Managing Firewalls in the Cloud: do Companies Know Enough About Security Intent?

How businesses are building firewalls is changing. We’re seeing a continued trend toward smaller firewall boundaries and micro-segmentation to support zero-trust strategies, although it can be very piecemeal. As businesses

The post Managing Firewalls in the Cloud: do Companies Know Enough About Security Intent? appeared first on The Cyber Security Place.

What Are The Black Friday Security Threats And How Can Organisations Avoid Them?

As Black Friday approaches, what are the security threats and how can organisations and consumers avoid them? Black Friday, and the following Cyber Monday, represent that time of year when

The post What Are The Black Friday Security Threats And How Can Organisations Avoid Them? appeared first on The Cyber Security Place.

Why Software Needs To Eat Your Business

When Marc Andreesen wrote the now-famous piece “Why Software is Eating The World” in the Wall Street Journal in 2011, he provided some unique insight into the power of software

The post Why Software Needs To Eat Your Business appeared first on The Cyber Security Place.

Nine In Ten SMBs Suffering Wi-Fi Issues

Mesh Wi-Fi could solve their problems, but many businesses don’t know what that is. If your Wi-Fi has prevented you from getting your job done on at least one occasion,

The post Nine In Ten SMBs Suffering Wi-Fi Issues appeared first on The Cyber Security Place.

UK MPs Call For A Cyber Security Minister To Defend Critical Infrastructure

The joint committee on national security strategy called the current security leadership ‘wholly inadequate’. A UK parliamentary committee has urged the government to appoint a dedicated cyber security minister to

The post UK MPs Call For A Cyber Security Minister To Defend Critical Infrastructure appeared first on The Cyber Security Place.

Phishers Up Their Game to Combat User Awareness

In an attempt to undermine the security industry’s effort to educate end users about phishing campaigns, malicious actors are evolving in their tactics, according to Zscaler. In a recent blog

The post Phishers Up Their Game to Combat User Awareness appeared first on The Cyber Security Place.

13 Malware-Laden Fake Apps on Google Play

A security researcher used Twitter to warn users about about malware embedded in fake apps available on Google Play. Lukas Stefanko, malware researcher at ESET, reported the malicious apps to

The post 13 Malware-Laden Fake Apps on Google Play appeared first on The Cyber Security Place.

Mirai Used as Payload in Hadoop YARN Vulnerability

A Mirai variant has been discovered targeting unpatched Linux servers, shifting the use of the malicious payload beyond the internet of things (IoT), according to new research from NETSCOUT ASERT.

The post Mirai Used as Payload in Hadoop YARN Vulnerability appeared first on The Cyber Security Place.

Center for Connected Medicine Polls Top Health Systems About 2019 Priorities

Cybersecurity is still the big one. But interoperability and telehealth are not far behind for leading organizations’ technology goals. The Center for Connected Medicine polled IT executives across 38 health

The post Center for Connected Medicine Polls Top Health Systems About 2019 Priorities appeared first on The Cyber Security Place.

DDoS Attack Volumes Increase By 110% In Q3 2018, According To Link11’s New Report

Link11, a cyber security firm, has released its Q3 DDoS Report, revealing that the scale and volume of DDoS attacks continued to grow in Europe during Q3 2018. The Link11

The post DDoS Attack Volumes Increase By 110% In Q3 2018, According To Link11’s New Report appeared first on The Cyber Security Place.

Malvertising in Apple Pay Targets iPhone Users

The Media Trust has discovered a recent malvertising campaign involving Apple Pay that is part of a large-scale phishing and redirect campaign targeting iPhone users visiting premium newspapers and magazines.

The post Malvertising in Apple Pay Targets iPhone Users appeared first on The Cyber Security Place.

Instagram Bug, Now Fixed, Exposed User Passwords

A security flaw in Instagram’s Download Your Data, a tool released in April this year, reportedly could have exposed user passwords, but the bug has now been fixed, according to

The post Instagram Bug, Now Fixed, Exposed User Passwords appeared first on The Cyber Security Place.

Black Friday Security Alert As Hackers Spoof Popular Brands

Shoppers need to be extra careful during the holiday season, report warns. Hackers are taking full advantage of the upcoming holiday season to prey on people looking to buy gifts

The post Black Friday Security Alert As Hackers Spoof Popular Brands appeared first on The Cyber Security Place.

Cyber Security Implementation: Firms Want It, But Less Do It, Finds Survey

Most respondents to a survey says cyber security implementation is critical, but only half think they are resilient enough to protect against cyber attacks. Despite 99% of respondents stating that

The post Cyber Security Implementation: Firms Want It, But Less Do It, Finds Survey appeared first on The Cyber Security Place.

Cybersecurity Is Getting Its Own Agency

Without any notable opposition to the Senate’s version of the bill, the House agreed to a reorganization of the Cybersecurity and Infrastructure Security Agency (CISA) Act earlier this week, according

The post Cybersecurity Is Getting Its Own Agency appeared first on The Cyber Security Place.

Major SMS Leak Exposed Millions Of Messages

Two-factor authentication codes were also exposed in Voxox leak. A huge database with user names, smartphone numbers, SMS messages and even two-factor authentication codes has been exposed, putting personal details at

The post Major SMS Leak Exposed Millions Of Messages appeared first on The Cyber Security Place.

BYOD Posing Major Mobile Security Risks

More and more organisations are allowing employees to bring their own devices for work. More than four in five organisations allow their employees to bring their own devices (BYOD) to

The post BYOD Posing Major Mobile Security Risks appeared first on The Cyber Security Place.

Protect your data… or face the chopping board

Poor security controls that contribute to a security failing and resulting data breach will lead to people losing their jobs. ‘By analysing people’s email behaviour, smart technology can now recognise

The post Protect your data… or face the chopping board appeared first on The Cyber Security Place.

OPM Still Failing on Security After 2015 Breach

The US Office of Personnel Management (OPM) has still not implemented over a third of the recommendations made by government auditors after a devastating 2015 breach. Some 29 recommendations remain “open” out

The post OPM Still Failing on Security After 2015 Breach appeared first on The Cyber Security Place.

HITRUST Common Security Framework – Improving Cyber Resilience?

A few weeks ago, Anthem agreed to a record $16 million HIPPA settlement with federal regulators to close the chapter on a data breach that exposed data on nearly 79 million individuals

The post HITRUST Common Security Framework – Improving Cyber Resilience? appeared first on The Cyber Security Place.

Building a Security Awareness Program

At the second annual Infosecurity North America conference at the Jacob Javits Convention Center in New York, Tom Brennan, US chairman, CREST International, moderated a panel called Securing the Workforce: Building, Maintaining and Measuring

The post Building a Security Awareness Program appeared first on The Cyber Security Place.

Critical Flaw in GDPR Plug-In For WordPress

Hackers have been found exploiting a critical security vulnerability that affects a GDPR plug-in for WordPress to take control over vulnerable websites according to security researchers at Wordfence. “These attacks show that

The post Critical Flaw in GDPR Plug-In For WordPress appeared first on The Cyber Security Place.

Despite rise in security awareness, employees’ poor security habits are getting worse

Despite an increased focus on cybersecurity awareness in the workplace, employees’ poor cybersecurity habits are getting worse, compounded by the speed and complexity of the digital transformation. Of the 1,600 global employees Vanson

The post Despite rise in security awareness, employees’ poor security habits are getting worse appeared first on The Cyber Security Place.

Cybersecurity and ethical data management: Getting it right

Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, computerized world of ours loves

The post Cybersecurity and ethical data management: Getting it right appeared first on The Cyber Security Place.