article thumbnail

SINET Announces 2015 Top 16 Emerging Cybersecurity Companies

CTOvision

Winners to Introduce Innovative Technologies at SINET Showcase in Washington, DC, November 3 & 4, 2015. The selected companies will share their work with buyers, builders, investors and researchers during the SINET Showcase on Nov 3 & 4, 2015 at the National Press Club in Washington, DC. ABOUT THE 2015 SINET 16 INNOVATORS.

Company 150
article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

1 area of spending increase in 2015, with nearly half (46%) planning to invest more in access control, intrusion prevention, and virus and malware protection. Multi-factor authentication for both cloud-based accounts and on-premise Active Directory will now be part of Windows, rather needing a hardware solution to complete.

Windows 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Is the NIST Phish Scale?

SecureWorld News

In a report from Cybersecurity Ventures, it's estimated that by 2021, global cybercrime damages will cost $6 trillion annually, compared to $3 trillion in 2015. Many of these programs focus on phishing, as it is one of the most common attack vectors. The Phish Scale method. This is why NIST developed the Phish Scale.

article thumbnail

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

Cloud Musings

The “Insight Partner Views on Cybersecurity” captures the latest news, trends and best practices surrounding cybersecurity by influential bloggers in the Dell Insight Partner program. This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech.

Dell 70
article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

Agencies were instructed to immediately patch critical vulnerabilities, review and tightly limit the number of privileged users with access to authorized systems and dramatically accelerate the use of strong authentication, especially for privileged users. Jackson 2015 ) Follow me at [link].

Dell 70
article thumbnail

Security attacks and countermeasures

Cloud Musings

via email) and attaches itself into files and other programs Downloader Software that downloads executable malicious code without the users knowledge or consent Figure 1. Also, programs that crack passwords or obtain them from other sources are readily available. Most Active Malware Today. Top Antivirus Software [7]. Rubenking, Neil J.,

Security 159
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

According to the Verizon 2015 Data Breach Investigations Report, insider and privilege misuse has had the most notable increase in activity and is occurring in every sector of the economy. The insider represents true risk to every firm and organization. Additionally, insiders now have new ways of coordinating with others.

How To 150