White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

Skyhigh Networks: CASB Security


Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Contrast Security


Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Recovering From a Security Breach


There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

How Google’s Custom Security Chip Secures Servers at Boot

Data Center Knowledge

Software security tools are increasingly augmented with dedicated security processors Read More. Design Google Hardware Security

Google 144

FedCloud Security Roadmap for 2018


As the Government continues to migrate to the cloud it becomes critical to integrate stronger security into its operations. Cloud and data security must go together. While cloud computing provides valuable IT architectures and solutions for government agencies, it also requires them to relinquish data security to public cloud service providers. Cloud Computing Cyber Security QuintessenceLabs

Connected Devices, Remote Security: Data Encryption and Security in the Cloud


Security” used to mean worrying about HTTPS certificates on your websites. Cloud Computing CTO Cyber Security NewsThe notion of a “device” was a browser and all you really had to do was to guarantee that traffic between it and your web servers was encrypted. Then the “bring your own device” (BYOD) phenomenon caused system administrators to worry about things like […].

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

Dedrone: Leading provider in airspace security


Dedrone is the leading provider in airspace security. They are attracting lots of attention in the security community, as well as from investors. Company Robotics Companies Security Companies

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas


Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

Update on Cloud Access Security Brokers (CASB)


Cloud Access Security Brokers (CASB) have been hot for the last 5 years. This makes sense, since any successful cloud transition strategy should including appropriate attention being placed on how to secure, control and […]. CTO Cyber Security NewsIt has gotten to the point where every firm is either using one, evaluating one, or studying how to use them.

Study 112

IBM & Cisco Join Security Forces To Fight Cybercrime And The Competition

Forrester IT

I was lucky enough to be invited to IBM's 3rd annual Security Summit in NYC for about 300 of its customers. IBM used the event to showcase a new IBM and Cisco joint security initiative whereby the two will work to integrate their security solutions to better combat advanced threats. Security & Risk. Cisco IBM Security & Risk Security and Risk cybercrime cybersecurity

IBM 214

Netskope: A leading provider of cloud security and CASB


Their focus is cloud security. CASB Security CompaniesNetskope is a highly regarded provider of Cloud Application Service Broker (CASB) capabilities. They help organizations understand online activities, protect data, stop threats, and respond to incidents.

A Beginner’s Intro Guide to Performing Your Own Cyber Security Audit


Cyber Security Cyber Threats cyber security SMBCybersecurity remains vitally important to small businesses and private individuals alike. Once a hacker accesses information they are not supposed to have they can cause all sorts of damage. You know that. Every business is different, but all should understand their particular nightmare scenarios and take action to mitigate those threats. But how do you […].

The Latest Developments In Corporate Data Security


The Latest Developments In Corporate Data Security Corporate data security is defined as the processes by which sensitive information is accessed only by authorized individuals and then destroyed when it is no longer needed. Proactive measures, including software purchases, third-party services, and internal company policies, offer data security solutions that would prevent most types of […]. Big Data Cloud Computing CTO Cyber Security

GreenTec: Persistent Data Protection With Storage Level Security


GreenTec-USA is a pioneer in data center modularization and optimization for servers, storage, video and secure document storage. The premise behind their cyber security solutions is one that leaders in the cyber business know well – breaches are not a question of if, but when. […]. Security Companies Computer security custom firmware data Data Protection Security storage level security Storage solutions technology

Could Your Next Security Analyst Be A Computer?

Forrester IT

We depend on the knowledge of our security analysts to recognize and stop threats. Analysts may also look outside the organization at threat intelligence feeds, security blogs, social media sites, threat reports and other resources for information. Security analysts are expensive resources. That means that some security incidents are never investigated, leaving gaps in threat detection. This is not new information for security pros. data security.

Verisign: Security Services


This feat alone requires world class best technology design, operation, maintenance and security skills. Verisign provides services and technology capabilities to enterprises including Managed DNS, Recursive DNS, DDoS protection and security threat intelligence offerings.

The October 2013 security updates

IT Pros Rock!

MS13-080 | Cumulative Security Update for Internet Explorer This security update resolves 9* issues in Internet Explorer. MS13-081 | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution This security update resolves seven issues in Microsoft Windows.

Centralized security in the cloud is the best security model

David Linthicum

You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. The alternative is not good—meaning that you had no idea of the DDOS attack, and now you’re playing cloud security whack-a-mole to fend off the attack until you can put more permanent solutions in place. It’s 6:00 a.m. on a Monday morning.

A Flicker Of Light: A new security stack points the path to safety


Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

Cyber Security in Aviation


Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

Applying Quantum Physics to Data Security Matters Now and in the Future


There are several reasons why applying quantum physics to data security will make a difference now and in the future. However, for businesses with a need for the highest level of data security, or are merely intrigued by the advance of quantum computing and its potential impact on cybersecurity, we encourage you to look at […]. CTO Cyber Security News

Intel makes security-first pledge

Computer Weekly

As it scrambles to deal with the Meltdown and Spectre processor exploits, Intel has made a series of security commitments

Intel 156

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

Understanding the Security Risks of New Cloud Software


However, some concerns about cloud security risks appeared early in the industry and are still relevant today. Both providers and customers must ensure that all data transfers occur over secure channels. Carol M. Evenson.

Cyber security requires man and machine, says F-Secure

Computer Weekly

Like other cyber security firms, Finland’s F-Secure is building an artificial intelligence capability into its products and services, but says this is no replacement for cyber security professionals

F-Secure highlights another critical Intel security issue

Computer Weekly

As Intel scrambles to issue security updates to address the Meltdown and Spectre exploits, researchers have highlighted another, unrelated, critical security issue that could affect millions of corporate laptops

Intel 147

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery


10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Microsoft: Government Should Regulate IoT Security

Data Center Knowledge

Azure IoT engineering head says bar is low in IoT security, and government should get involved Read More. Business Cloud Featured Internet of Things Microsoft Regulation Security