-
Feb07
Daily Security News from @trustpath - Feb 7, 2017
Daily Security news from @trustpath.
Endpoint security how to get it right?
your business security. And one that most businesses spend a lot of time … more.
Mitigating Cybercrime Risks With Big Data Technology
Infamous data breaches in the UK have increased from 1 per year in 2004-2013 to 4 per year in 2014 2016. The reason behind this unusual pattern … more.
Magal Wins $8.5M Order for New Border Protection Solutions (Video)
… cutting-edge hybrid PSIM with SEIM (Physical Security Information Management system integrated with Security Information & Event Management). more.
Privacy Commissioner wants $1m fines for data breaches, data portability
Credit card details are required to authenticate your account. You won’t be charged until your trial has ended. Cancel anytime. I understand that my … more.
Magal Wins $8.5M Order for New Border Protection Solutions (Video)
… cutting-edge hybrid PSIM with SEIM (Physical Security Information Management system integrated with Security Information & Event Management). more.
SailPoint Gives Enterprises the Power to Protect Against the Next Wave of
Business Wire (press release) SailPoint’s new release gives organizations the power to protect against the next big wave of data breaches through intelligent and actionable … more.
10 lessons learned from 2016’s biggest data breaches
Organizations are taking more of their data and applications to the cloud, increasing the risk of a cybersecurity incident. Here are 10 lessons IT can … more.
Kate Macmillan joins PwC cyber security team
She advises clients on the legal implications and risks associated with data breaches and the steps to take to help protect a company’s reputation - a … more.
General Data Protection Regulation: How to Prepare
All options should be considered, from practical policies (such as a Clean Desk Policy) that help prevent data breaches, to response plans which … more.
Security Report: Capitol Police Investigating Congressional IT Contractors
Gartner releases Magic Quadrant for Endpoint Security: Gartner’s recently released Magic Quadrant for Endpoint Protection Platforms names four … more.
Palo Alto Networks Delivers Industry-First Capabilities to Prevent
Yahoo Finance These capabilities, delivered from the next-generation firewall, prevent the theft and abuse of stolen credentials and complement additional malware … more.
Healthcare and Security: Third-Party Medical Devices Often Provide Point of
Formtek Blog (blog) Among all HIPAA data breaches, cyber attacks against health care providers now account for nearly a third of all data breaches, according to … more.
VMware Helps AeroData Take Flight with Enhanced Security and Application
DABCC.com … applications used by AeroData, making it easy for them to transition from decentralized log management to a centralized log management approach … more.
Endpoint security is the new sexy: Samu Konttinen, F-Secure
Some vendors call it next generation, some call it EDR (Endpoint Detection and Response). There’s a paradigm shift in endpoint wherein one cannot … more.
Closing the Retail Cybersecurity Gap Between Breaches and Fraud
The retail industry is a target for cyber criminals that seek to steal customer information and payment details in data breaches and point of sale attacks. more.
Sean Spicer’s WHOIS data is public for everyone to see
Yahoo, of course, has had its fair share of data breaches confirmed in recent months. The WHOIS database documents the owners of domain names, … more.
Dimension Data Releases New Clinical Mobility Solution
Many modern solutions include cloud access and storage for mobile devices, which leave endpoints vulnerable to data breaches if the devices are … more.
SentinelOne Makes Major Machine Learning Enhancement to Its Next-Generation
Marketwired (press release) With DFI, SentinelOne Endpoint Protection Platform (EPP) becomes the only next-generation endpoint protection offering to seamlessly pair advanced … more.
TopSpin Security Earns Three Finalist Honors in Info Security Product
Broadway World TopSpin and its breach detection solution are finalists in the following awards categories: Deception Based Security; Companies with Tomorrow’s … more.
MySpace becomes every hackers’ space with top breach in 2016, report says
Realize that data breaches don’t require threat actors. Something as simple as emailing personal information to the wrong person qualifies as a … more.
Will the Good Guys Ever Catch Up to the Bad Guys When It Comes to
Healthcare Informatics (blog) … at the same time, successful data breaches are also up significantly. These were the findings of a recent survey conducted by Thales, a data security … more.
Sizing Up Health Data Breaches Reported in 2017 So Far
to the federal wall of shame tally have in common? Find out in this … more.
Survey Indicates ‘Citizen Developer’ Security, Data Risks
… stemming from the sheer volume of mobile apps hitting the market, opening up new attack vectors and increasing the risk of data breaches. “Adding … more.
-
Read these next:
- Daily IoT/Blockchain News from @surgethings - Feb 7, 2017
- Daily Cloud Computing News from @cloudfeednet - Feb 6, 2017