-
Feb03
Daily Security News from @trustpath - Feb 3, 2017
Daily Security news from @trustpath.
MPs question UK’s cyber attack defences
A skills shortage and “chaotic” handling of personal data breaches are undermining confidence in the government’s ability to protect the UK from cyber … more.
Report: Global Security Information and Event Management Market, 2016-2024
The security information and event management market is a combination of security event management (SEM) and security information management … more.
Government ‘needs to raise its game’ on cyber security, MPs warn
Britain’s ability to repel cyberattacks is being undermined by skills shortages and “chaotic” handling of personal data breaches, according to MPs. more.
Carbon Black named a Visionary in Gartner Magic Quadrant for Endpoint
PRWire (press release) According to the Gartner ‘Magic Quadrant for Endpoint Protection Platforms’ by Eric Ouelett, Avivah Litan and Ian MacShane on Jan. 30, 2017: The … more.
MPs warn Government to ‘raise its game’ over cyber security
“Its approach to handling personal data breaches has been chaotic and does not inspire confidence in its ability to take swift, coordinated and effective … more.
Building cyber resilient businesses from the inside out
Juniper research has predicted that the rapid digitisation of consumers’ lives and enterprise records will increase the cost of data breaches to $2 … more.
Carbon Black named a Visionary in Gartner Magic Quadrant for Endpoint
PRWire (press release) In addition to being the de facto standard in endpoint detection and response (EDR), Carbon Black’s addition to the 2017 Gartner Magic Quadrant for … more.
Enquires continue into Grimsby hospital cyber attack, as MPs criticise
Grimsby Telegraph This comes as MPs have warned that a shortage of skills when handling personal data breaches is hurting the Government’s ability to protect the UK … more.
BFSI Security Market size and Key Trends in terms of volume and value
Satellite PR News (press release) Physical security information management is a software that act as a standalone platform for integrating multiple unconnected security application and … more.
Defying gravity to combat today’s data insecurity
Gartner projected that information security spending would reach $81.6 billion in 2016, yet the data breaches keep coming. The switch from perimeter … more.
Trend Micro positioned highest and furthest in the Leaders Quadrant for its
Satellite PR News (press release) … Leaders quadrant for ability to execute and completeness of vision in Gartner, Inc.’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). more.
Government committee criticises watchdogs over UK data breaches
The British government and its watchdogs are doing a poor job of protecting citizens and companies from online attacks, according to the public … more.
United Arab Emirates: Cyber Security And Data Protection Breaches: A Brief
Mondaq News Alerts (registration) This article reviews some of the Cyber Security and Data breaches that have occurred in recent years and examines how certain governments, … more.
Just One in Four Banks Confident of Breach Detection
Less than a quarter of banking executives are confident their organization can detect breaches, despite the public having far more confidence in the … more.
UK’s chronic cyber skills shortage leaving Britain at risk of cyber attack,
Computer Business Review According to the PAC, the processes of the government departments to record departmental personal data breaches are inconsistent and … more.
Just One in Five Banks Confident they Could Detect a Cybersecurity Breach
… particularly banks, are spending a staggering amount of money securing their systems, the number and frequency of data breaches is still rising. more.
PAC: Government must ‘raise its game’ on cyber security
[The government’s] approach to handling personal data breaches has been chaotic and does not inspire confidence in its ability to take swift, … more.
DATASHIELD Introduces Turnkey Cyber Security Appliance
It includes, the entire RSA NetWitness Suite for threat analysis (and endpoint detection) and Datashield’s proprietary Shieldvision software for cyber … more.
This local security company is headed to the Super Bowl
See, Tysons Corner-based Vidsys has developed a software platform they describe as Converged Security Information Management. The platform … more.
Threat hunting and why combating cyber attacks needs a human element [Q&A]
The threat landscape facing businesses is more complex than ever and it’s rapidly changing. No surprise then that traditional approaches to security … more.
Comodo product covers Mac OS X, Linux Systems
CYBER-SECURITY solutions developer Comodo Group Inc. announced on January 31 the release of its updated Advanced Endpoint Protection … more.
ISACA Webcast Will Highlight Role of Threat Lifecycle Management in
Broadway World BOULDER, Colo., Feb. 2, 2017 /PRNewswire-iReach/ LogRhythm, The Security Intelligence Company, announced that Seth Goldhammer, senior … more.
Infographic: Protecting Patient Information in the Age of Data Breaches
frequency, size, and cost to providers. But, is this just the beginning? more.
Report: Healthcare IT Security Spending is Up, But So Are Data Breaches
Organizations tend to increase spending on things that they’ve used in the past, but are not the most effective at protecting against data breaches. more.
Biometric 2 Factor Authentication for Salesforce is now available on
Benzinga According to Gartner research: ‘in 2015 there were more than 750 identity-related data breaches in the USA alone. These breaches resulted in … more.
Chances Are Your Startup Is Going To Get Hacked–Here’s What To Do
Data breaches make headlines when they occur at big companies that should have the resources to protect themselves from hackers. In addition to … more.
Traps Named A Visionary in Gartner’s Magic Quadrant for Endpoint Protection
Gartner has just released its 2017 Magic Quadrant for Endpoint Protection Platforms (EPP), and we’re honored that Palo Alto Networks is named a … more.
IDC Report: Modern Defense Against Sophisticated Attacks Requires
CSO Online Read this IDC Technology Spotlight to explore the key capabilities of modern endpoint security technologies in the market. See why enterprises are … more.
Yahoo! Gives Snapshot of Privacy Law for 2017
1 Companies that fail to discover or remediate data breaches have traditionally run into a host of legal issues, ranging from contract and tort claims to … more.
Security Intelligence Platform from Exabeam launched
Cloud Connectors: Since almost every organization now operates some percentage of its IT in the cloud, integrating that data into log management, … more.
Global Data & Privacy Update - February 2017
… affecting the way data is managed and protected, as well as reporting on the most recent news governing data breaches and industry developments … more.
-
Read these next:
- Daily IoT/Blockchain News from @surgethings - Feb 3, 2017
- Daily Cloud Computing News from @cloudfeednet - Feb 2, 2017