New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

The Forrester Wave™: Managed Security Services Providers (MSSPs), Europe, Q4 2018

Forrester IT

I published my first Forrester Wave™ today, covering the managed security services provider (MSSP) market in Europe.

The Growing Importance Of Cyber Security Skills

CTOvision

As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. CTO Cyber Security News Training and EducationIndeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […].

White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

What Financial Services Executives Need To Know About Data Security

CTOvision

Read why financial services executives need to know about data security on Forbes : The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. Cyber Security NewsIt’s easy to understand why. The industry is known for its wide array of interconnected systems and the processing of millions of […].

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Note that you need to deal with security at the directory level as well, so the directory itself does not become a vulnerability. Security ops. Often overlooked, this is the operational aspect of all of security.

AI in cyber security: a help or a hindrance?

CTOvision

Cyber Security NewsWith a disappearing IT perimeter, a widening skills gap and the increasing sophistication of cyber attacks, it is not surprising that many enterprises are struggling to deal with the current cybersecurity landscape. It’s not just the continued data breaches that have hit the media headlines this year, but it’s the nature of the data – […].

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

Verisign: Security Services

CTOvision

This feat alone requires world class best technology design, operation, maintenance and security skills. Verisign provides services and technology capabilities to enterprises including Managed DNS, Recursive DNS, DDoS protection and security threat intelligence offerings.

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Rushed Privacy Features Results In Sloppy Security

Forrester IT

cybersecurity privacy security & risk promotedFacebook Loses More User Data (This Time Unintentionally) Facebook announced that it experienced a breach this week that lost 50 million user’s data. Ironically, the breach happened in part due to exploited bugs in three features developed to give users more control over their privacy. Some quick key lessons to take away from this breach: […].

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 InfoSec casino infosec security awareness

Garrison: Secure Web Browsing

CTOvision

With this post, we are initializing our coverage of Garrison Technology, a revolutionary provider of ultra-secure web browsing. Internet access for government employees presents one of the gravest threats to enterprise cyber security today. Company CTO Cyber Security News Security CompaniesCompromises on federal networks via spear phishing, watering hole attacks and drive-by-downloads permits cyber attackers ranging from criminals to nation states […].

Announcing OODA: A Company Addressing Next Generation Security Challenges

CTOvision

I’m very excited about this new venture and intend on making a positive difference in addressing several next generation security challenges. For more see: OODA.com Industry Veterans Launch New Company to Address Next Generation Security Challenges Security, […]. Editor’s note: The below is from the press release for the launch of my new firm, OODA LLC.

Cyber Security in Aviation

CTOvision

Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

Recovering From a Security Breach

CTOvision

There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

FTC Launches New Cyber Security Tools for Small Business

CTOvision

This effort was part of the National Cyber Security Awareness Month (NCSAM) in October, which has been recognized every month since 2003. Cyber SecurityThe Federal Trade Commission (FTC) has launched a resource to raise awareness about the vital role cybersecurity plays for the 32+ million small businesses in the US. The NCSAM was established with the collaboration […].

Hacking The Cloud: Kubernetes’ first major security hole discovered

CTOvision

Kubernetes has become the most popular cloud container orchestration system by far, so it was only a matter of time until its first major security hole was discovered. critical security hole. CTO Cyber Security NewsAnd the bug, CVE-2018-1002105, aka the Kubernetes privilege escalation flaw, is a doozy. It’s a CVSS 9.8 With a specially crafted network request, any user […].

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 205

Corelight: Powerful network visibility solution for security professionals

CTOvision

Company CTO Cyber Threat Intelligence Network Traffic and Analysis Security Companies CorelightCorelight was founded by the creators of the open-source Bro project.

Alert Logic: Cloud Security as a Service

CTOvision

Alert Logic is widely known as an a provider of managed security services which can provide continuous monitoring and response managed by experts for firms using cloud, on-prem or hybrid architectures. Managed Services, Outsourced Security Alert Logic

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas

CTOvision

Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

IBM Bets Big On Security Training And Leadership As A Differentiator

Forrester IT

In late 2016, IBM announced the availability of its full-scale cyber range at the Cambridge, MA headquarters of its security division. The range isn’t just about training security incident response analysts; it’s a full […]. cybersecurity security & risk

Building The Language Bridge Between Security and the C-Suite

Forrester IT

If you had half an hour with a board member, and you wanted to get coaching from them about how to communicate with them about security, what would you ask them?

Machine Learning Is Transforming Data Security

Eric D. Brown

Data is the lifeblood of any organization today so it should be easy to understand that security of that data is just as important (if not more important) that the data itself. It seems that data security (or rather the lack thereof) has been in the news regularly over the last few years.

How Google’s Custom Security Chip Secures Servers at Boot

Data Center Knowledge

Software security tools are increasingly augmented with dedicated security processors Read More. Design Google Hardware Security

Google 147

The Bill Codifying The New Cybersecurity and Infrastructure Security Agency Is Short and Sweet

CTOvision

The Cybersecurity and Infrastructure Security Agency (CISA) was created out of several existing organizations within the DHS. CTO Cyber Security NewsThe nation has a new federal agency. The CISA was codified by a law signed by the President on 16 November 2018. I read what DHS said about CISA (see more here). Then thought I should spend a […].

CipherCloud: New approaches to cloud security

CTOvision

CipherCloud has a very unique approach to enhancing security of enterprise data in the cloud. The post CipherCloud: New approaches to cloud security appeared first on CTOvision.com. Cloud Computing Company Security Companies ciphercloud