Saturday , August 17 2019
Home / Hot Topics / Security

Security

Huawei Calls on U.S. to Adjust its Approach to Tackle Cybersecurity Effectively

Huawei filed a motion for summary judgment as part of the process to challenge the constitutionality of Section 889 of the 2019 National Defense Authorization Act (2019 NDAA). It also called on the U.S. government to halt its state-sanctioned campaign against Huawei because it will not deliver cybersecurity. Banning Huawei using cybersecurity as an excuse “will do nothing to make ...

Read More »

9 Out of 10 Security Professionals Say Their Environments Have Been Damaged by a Cyberattack in the Last Two Years

Tenable released the ‘Cybersecurity in Operational Technology: 7 Insights You Need to Know’ report, an independent study by the Ponemon Institute. The study identifies the true extent of cyberattacks experienced by critical infrastructure operators – professionals in industries using industrial control systems (ICS) and operational technology (OT). It found that 90% of respondents stated their environments had been damaged by at ...

Read More »

Cybercriminals Using Popular TV Shows to Spread Malware: Says Kaspersky Lab

Cybercriminals are actively using new episodes of popular TV shows to distribute malware, research by Kaspersky Lab has found. Game of Thrones, The Walking Dead, and Arrow are the shows receiving the most attention from attackers. These and other findings are published in a new report, ‘Game of Threats: How cybercriminals use popular TV shows to spread malware.’ TV shows ...

Read More »

Kaspersky Lab talks Managing Risks With Cyber Threat Intelligence at CISO Summit

In a recent CISO Summit held in Mumbai, Kaspersky Lab presented on “Efficiently Managing Risks with Cyber Threat Intelligence”. Mr Sidharth Mutreja, Enterprise Solutions Architect of Kaspersky Lab, explained the steps and criteria required in managing cybersecurity risks with threat intelligence. Counteracting modern cyberthreats requires a 360-degree view of the tactics and tools used by threat actors, in order to ...

Read More »

Continuous Response Needed To Fight Modern Threats – Tim Orchard, F-Secure

As the threat landscape continues to evolve, so does the need for organizations’ approaches to defending against the business impact of cyber attacks. In light of this trend, cybersecurity provider F-Secure is calling for greater emphasis on both the preparedness for a breach as well as fast and effective containment that covers the correct balance of people, process and technology. ...

Read More »

FireEye Recognized as Leader in Incident Response by Leading Independent Research Firm

FireEye, Inc. announced that it was named a leader in the Forrester Research, Inc. report: “The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2019.” In the report, 15 vendors were evaluated across 11 criteria, covering current offering, strategy, and market presence. FireEye received the highest possible score (5.0) in eight of the 11 criteria, including: Incident Preparation Incident Response Industrial ...

Read More »

Global Research Reveals New Challenges and Lingering Confusion around Data Protection inthe Cloud

Barracuda released key findings from a global research study titled: Closing Backup and Recovery Gaps. Barracuda surveyed more than 1,000 IT professionals, business executives, and backup administrators worldwide to find out more about their data protection strategies. Read the full report: https://www.barracuda.com/data-protection-report The research reveals new details about the attitudes and approaches SMBs have when it comes to backing up and ...

Read More »

Latest Strategies Cybercriminals are Using to Get Past Email Security Gateways

Barracuda released key findings from a report with the title Spear Phishing: Top Threats and Trends. Barracuda researchers evaluated more than 360,000 spear-phishing emails in a three-month period, identifying and analyzing three major types of attacks: brand impersonation, business email compromise, and blackmail. Read the full report: https://www.barracuda.com/spear-phishing-report The report takes an in-depth look at how these three types of attacks ...

Read More »

Cybercriminals Turn Opportunistic with Cryptocurrency Mining

Even as businesses capitalize on the latest security intelligence and protections to stay ahead in the evolving cybersecurity landscape, Asia Pacific continues to be an attractive region for cybercriminals. Microsoft today unveiled the Asia Pacific findings from the 24th edition of its Security Intelligence Report (SIR), an annual study aimed to improve cyber resilience in the region. The SIRv24 comprises of core insights ...

Read More »

F-Secure Radar Wins Techconsult Vulnerability Management Award

Finnish cybersecurity company F-Secure continues to receive market recognition for their solutions, with the current win being a first for the company. The latest accolade is the Professional User Rating: Security Solutions 2019 (PUR-S) Champion Award given for Radar by German research and analyst firm Techconsult. F-Secure Radar is a PCI ASV certified, turnkey vulnerability scanning and management platform. It allows users ...

Read More »