Top 10 IT security stories of 2016

Computer Weekly

Here are Computer Weekly’s top 10 IT security stories of 2016

Introducing The Forrester Wave™: Digital Risk Monitoring, Q3 2016

Forrester IT

We recently published our Forrester Wave™: Digital Risk Monitoring, Q3 2016 report. Social Media Security. Digital Governance Digital Risk Digital Risk Monitoring HUMINT OSINT Risk Intelligence Security and Risk Social Media Security forrester wave

Mobile 178

DDOS Trends Report 2016


The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. In Q2 2016, Verisign observed an increase of 75 percent in DDoS attack activity year over year. Cyber SecurityMarty Meehan.

Trends 109

RSA 2016: Key Takeaways

The Investing Edge

San Francisco buzzed with security vendors, buyers and investors as they crowded the lobbies of hotels and coffee shops with endless meetings. Events Security & Compliance cybersecurity Enterprise IT Security

Hotels 130

TechNet Augusta 2016: Defensive Cyber


CTO Cyber Security DOD News CentOS Linux Linux distribution Linux kernel Red Hat Red Hat Enterprise Linux Software repository SUSE Linux distributionsChrisScott. This is the sixth in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet.

Linux 152

Dr. Chaos Security Podcast – May 8th, 2016

Doctor Chaos

Click here for Audio only version Story 1: Virus Total closing down vendors that do not share: [link] Information sharing in the industry is a good thing, but what do you to keep things fair? Story 2: Drunk Uber Girl We will keep this to 5 minutes. This will be on […]. Podcast podcast

2016: A systems security disaster

Network World

This will likely make you angry. It made me livid. . It’s a report, 34 pages long, from the Identity Theft Resource Center of the known systems breaches just this year. Read it and rage. . It does not include the San Francisco Metro Transit Authority (SFMTA) hack from Thanksgiving weekend , where the SFMTA had to let passengers go free through the gates. To read this article in full or to leave a comment, please click here

How Far has Face-Tracking Technology Come in 2016?


Where do you think face-tracking technology will go towards the end of 2016? Artificial Intelligence Computer securityEllie Martin.

Election Impact 2016: 10 Nov on Capital Hill


CG Roll Call is hosting Election Impact 2016 on 10 Nov at the Hyatt Regency Washington on Capitol Hill. CTO Cyber Security Events News Cognitio Computer securityMichael Johnson. This event is an opportunity to hear directly from leaders in DC on the impact of the Congressional and Presidential elections, including diving deep into topics like cybersecurity, healthcare, defense, energy, technology and budgets.

Grading Forrester’s 2016 Cybersecurity Predictions Plus A Sneak Peek Into Our 2017 Predictions

Forrester IT

Every fall Forrester's Security & Risk team comes together to make a set of predictions on the issues that will have the greatest impact on our clients in the next year. Instead, we go out of our way to make detailed predictions that force us to take strong stances, can easily prove wrong or right and are actionable by security and risk professionals. Before we provide a sneak peek into our 2017 predictions, it's worth looking back and grading our 2016 predictions.

A Chat with Jeh Johnson, Secretary of Homeland Security, at the July 2016 Aspen Forum


In his final months in office, the Secretary of Homeland Security Jeh Johnson gives us his assessment of the state of the nation’s security. CTO Cyber Security News Video Jeh Johnson United States Secretary of Homeland SecurityMichael Johnson.

Simulated cyber attack in London adds finalists to 2016 UK Cyber Security Challenge

Computer Weekly

Ten would-be cyber warriors head to the final of the UK Cyber Security Challenge after showing off their skills to prospective employers in dealing with a simulated cyber attack

Dr. Chaos Security Podcast – April 18th, 2016 – Dark Web

Doctor Chaos

Dark Web expert Julien Savoie discusses what is the Dark Web, Dark Net markets, and gives insight into the current threats and technology that make up the Dark Web. Join us as Julien Savoie demystifies the Dark Web.

.Net 130

The 2016 Forrester Data Privacy Heatmap Points To Continued EU Influence On Global Regulations

Forrester IT

To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and practices for 54 different countries. Earlier today, we published the 2016 version to the tool , as well as a free version with limited access. The slow global convergence toward the requirements outlined in the regulation continued through 2016.

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

UK National Cyber Security Centre set to launch

Computer Weekly

NCSC is due to launch officially on 1 October 2016 and will help the healthcare sector deliver consistent quality of data security

The Cyber Threat updated for 2016: Kindle version provided free 22, 23, 24 June 2016


Thanks to we are able to provide our readers with a free copy of the Kindle version of our book on The Cyber Threat during a special three day promotion running 22, 23 and 24 June 2016. Big Data Cloud Computing CTO Cyber Security Interesting Books NewsBob Gourley.

Improve Deployment Speed and Reduce Overhead with Containers in Windows Server 2016

IT Pros Rock!

Learn how containers work in Windows Server 2016 and how they can be used to increase deployment speed, workload density and decrease server overhead to create a more efficient IT environment. Introduction to Windows Server 2016 Containers. [ 7:31 ] What about security?

TechNet Augusta 2016: US Army Networks and Services


The first was an overview you can find at: TechNet Augusta 2016 “ Cyber in the Combined Arms Fight ”. CTO Cyber Security DOD Government News Denial-of-service attack Electromagnetic weapon Electronic warfare United States ArmyChrisScott.

Middle East CISO Council CEO warns of global cyber security storm

Computer Weekly

Cyber security issues will be a major theme at this month’s GITEX Technology Week 2016 conference in Dubai

Security Think Tank: Cyber security is everyone’s responsibility

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses

Dr. Chaos Security Podcast – March 29th, 2016 – Exploit Kits

Doctor Chaos

Chaos Security Blog: Twitter: Exploit Kits are tools attackers use to compromise and control systems. They are used to distribute malware such as remote access toolkits (RATs) and Ransomware such as CryptoLocker. They are used by criminals and groups from all over the world. Join my co-host Anthony Giandomenico ( as we […]. Podcast exploit podcast

Microsegmentation – Secure Your Internal Network


Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Intel Security to become McAfee in April 2017

Computer Weekly

Intel Security has detailed a wave of product innovations at Focus 2016, but promises more to come when it is spun out as an independent company under the McAfee banner

Intel 177

Intel Security shifts channel strategy

Computer Weekly

Intel Security adjusts its channel strategy in response to a market shift towards services-based security

Intel 176

Global infosec spending to reach £63bn in 2016, says Gartner

Computer Weekly

Athough security spending is moving to detection and response, Gartner expects preventive security to continue strong growth

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas


Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

Unlock the next level of cloud security

David Linthicum

I’m often asked about cloud security best practices, and my answer is always the same: It depends on what you want to protect in the cloud. Indeed, the security services you’ll find in the cloud are about as good as they get in IT. Discover how to secure your systems with InfoWorld's Security newsletter. ]. But putting all security bets aside, the best way to protect your application in the public cloud is to actively watch it.

Android Security Bulletin November 2016: What you need to know

Tech Republic Security

Get the highlights of the November 2016 bulletin The Android Mediaserver is back in the critical column for vulnerabilities.

Security Think Tank: Communication is key to cyber security in digital era

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses

Security Think Tank: Cyber security must be recognised as a fundamental component of business

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses

2016 Internet of Things (IoT) Predictions


To help IoT solution providers define their 2016 product roadmap, here are some of INSIDE Secure’s top IoT predictions for the year: IoT hype will become reality. In 2016 there will be a growing number of authentic success stories where the IoT provides real value to consumers and enterprises. As a result, data privacy threats, like Ransomware, will extend to IoT devices, which collect personal information, but lack appropriate security features. Trevor Daughney.

Top Technology News for 15 June 2016


At WWDC 2016, Apple is finally embracing Not Apple - Macworld. Leading Federal-Mogul Powertrain Technologies Featured on All 2016 International Engine of the Year Award. Social Security wants to completely start over - Big Data Cloud Computing Disruptive IT DoD encryption FBI ipad IPhone Security Tech/Internet technologyCharles Hall. Need a primer on marketing terms for Machine Learning?

3D 91

Android Security Bulletin December 2016: What you need to know

Tech Republic Security

Although there are no new Critical vulnerabilities in the Android December 2016 Security Bulletin, there are plenty of flaws to be found this month. Get the highlights

Three Steps to Manage, Protect and Secure Data in 2016

Data Center Knowledge

According to Gartner, employees will have four personal computing devices that they could use for work by 2018, over and above any corporate IT assets that might be provisioned for them. Read More. Industry Perspectives