Integration with Cisco Technologies Delivers IT / ICS Security

Large organizations utilize a variety of technologies and solutions to create cyber resiliency, an important part of the best practice known as Defense in Depth. But, using disparate systems can actually result in increased security exposure and risks, and slower response to threats. A few years ago, Cisco began working with the best and brightest minds around the world to address this issue. This led to the creation of their…

September 19, 2018
Read More >>

Global Study Finds Artificial Intelligence is Key Cybersecurity Weapon in the IoT Era

As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, coupled with an acute shortage of skilled security professionals, IT security teams need both a new approach and powerful new tools to protect data and other high-value assets. Increasingly, they are looking to artificial intelligence (AI) as a key weapon to win the…

September 19, 2018
Read More >>

Akamai Credential Stuffing Report Shows Financial Services Industry Under Constant Attack From Automated Account Takeover Tools

According to the Akamai 2018 State of the Internet / Security Credential Stuffing Attacks report, worldwide malicious login attempts are on the rise. Findings from the report show that Akamai detected approximately 3.2 billion malicious logins per month from January through April 2018, and over 8.3 billion malicious login attempts from bots in May and June 2018 – a monthly average increase of 30 percent. In total, from the beginning…

September 19, 2018
Read More >>

Future UK Cyber Security Stars Tackle Vulnerable Cryptocurrency in Latest Challenges

On Friday, Her Majesty’s Government Communications Centre (HMGCC) and leading science and engineering company QinetiQ hosted the latest Cyber Security Challenge UK Face-to-Face competition at QinetiQ’s headquarters in Farnborough. The competition saw 28 code-breaking amateurs from across the country ethically hack the cryptocurrency wallets of customers from a fictitious bank. The challenges, which put contestants’ cryptography, problem-solving, automation and scripting skills to the test, included breaking into digital vaults and…

September 17, 2018
Read More >>

Kroll Earns Global CREST Accreditation for Penetration Testing Services

Kroll, a division of Duff & Phelps, a global leader in risk mitigation, investigations, compliance, cyber resilience, security and incident response solutions, announces that CREST has accredited Kroll as a global CREST Penetration Testing service provider. This accreditation affirms Kroll’s expertise and authority to conduct penetration testing for clients around the world and helps provide assurance to organisations regarding the strength of their cyber resilience.   CREST was set up…

September 17, 2018
Read More >>

City of Stockholm Selects MobileIron Threat Defense to Detect and Mitigate Mobile Threats

MobileIron, the secure foundation for modern work, today announced that City of Stockholm has selected MobileIron Threat Defense to detect and mitigate mobile threats. MobileIron Threat Defense will be deployed on 30,000 mobile devices used by the employees of the City of Stockholm. MobileIron Threat Defense provides unparalleled mobile threat protection, securing mobile devices from device, network, and app threats. Organizations can protect sensitive data by detecting and remediating known…

September 11, 2018
Read More >>

City of Stockholm Selects MobileIron Threat Defense to Detect and Mitigate Mobile Threats

MobileIron, the secure foundation for modern work, today announced that City of Stockholm has selected MobileIron Threat Defense to detect and mitigate mobile threats. MobileIron Threat Defense will be deployed on 30,000 mobile devices used by the employees of the City of Stockholm. MobileIron Threat Defense provides unparalleled mobile threat protection, securing mobile devices from device, network, and app threats. Organizations can protect sensitive data by detecting and remediating known…

September 11, 2018
Read More >>

RiskIQ implicates Magecart in breach of British Airways

RiskIQ, the global leader in digital risk management, today revealed that its researchers traced the breach of 380,000 sets of payment information belonging to customers of British Airways to Magecart, the credit-card skimming group made infamous for its July breach of Ticketmaster. Because the attack was reported by British Airways to be web-based and targeting credit card data, RiskIQ researchers strongly suspected Magecart was behind it. Leveraging the company’s global…

September 11, 2018
Read More >>

RiskIQ implicates Magecart in breach of British Airways

RiskIQ, the global leader in digital risk management, today revealed that its researchers traced the breach of 380,000 sets of payment information belonging to customers of British Airways to Magecart, the credit-card skimming group made infamous for its July breach of Ticketmaster. Because the attack was reported by British Airways to be web-based and targeting credit card data, RiskIQ researchers strongly suspected Magecart was behind it. Leveraging the company’s global…

September 11, 2018
Read More >>

RiskIQ implicates Magecart in breach of British Airways

RiskIQ, the global leader in digital risk management, today revealed that its researchers traced the breach of 380,000 sets of payment information belonging to customers of British Airways to Magecart, the credit-card skimming group made infamous for its July breach of Ticketmaster. Because the attack was reported by British Airways to be web-based and targeting credit card data, RiskIQ researchers strongly suspected Magecart was behind it. Leveraging the company’s global…

September 11, 2018
Read More >>