Industry Insight News, Articles and Updates

Farsight Security Services promotes Robert Batch to IT administrator

Farsight Security Services promotes Robert Batch to IT administrator

By

Farsight Security Services has promoted Robert Batch, a 12-year veteran employee, to IT administrator.

Rapid7 appoints Marc Brown and Tom Schodorf to Board of Directors

Rapid7 appoints Marc Brown and Tom Schodorf to Board of Directors

By

Rapid7 has appointed Marc Brown and Tom Schodorf to its Board of Directors.

IT jobs volume hits peak despite slow start in 2016

IT jobs volume hits peak despite slow start in 2016

Despite a slow start at the beginning of 2016, the IT jobs market in London experienced an upturn in the number of jobs with June being the highest month so far for job volume in 2016.

Twitter rolls out online application process for account verification

Twitter rolls out online application process for account verification

By

Twitter said Tuesday it had created an online application process so that Twitter accounts could receive verified status.

Researchers detect malware in TLS connections without decrypting traffic

Researchers detect malware in TLS connections without decrypting traffic

By

Researchers discovered a way to detect and block malware in Transport Layer Security (TLS) connections without decrypting the traffic.

President Trump 'would be a disaster for innovation,' say Silicon Valley leaders

President Trump 'would be a disaster for innovation,' say Silicon Valley leaders

By

Silicon Valley tech sector leaders released a statement expressing dismay at the possibility of Donald Trump becoming president.

Cybercrime now tops traditional crime in U.K.

Cybercrime now tops traditional crime in U.K.

By

A report from the U.K.'s National Crime Agency found that cybercrime has passed traditional crime in terms of impact.

Keydnap malware targeting Mac users, particularly security researchers

Keydnap malware targeting Mac users, particularly security researchers

By

A new malware strain, dubbed Keydnap, is targeting Mac users, perhaps, in particular, security researchers.

Clinton pledges tech evolution

Clinton pledges tech evolution

By

Democratic presidential hopeful Hillary Clinton called for administrative reform to help bring the U.S. copyright system into the digital age.

Recycled hard drives rich with residual data, study

Recycled hard drives rich with residual data, study

By

The amount of digital information stored on recycled devices is staggering, a new study found.

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

By

London is the center of tech startups in Europe. So, how will the U.K.'s separation from the EU impact the tech sector?

Severe flaws detected in popular compression library

Severe flaws detected in popular compression library

By

Patches have been made available for programming errors found in libarchive that could make software used in a number of platforms vulnerable to exploitation.

Twitter, HealthCare.gov top annual list of most trustworthy websites

Twitter, HealthCare.gov top annual list of most trustworthy websites

By

At one time ridiculed over lax cybersecurity, the federal health insurance exchange site HealthCare.gov scored second-highest out of approximately 1,000 websites in the Online Trust Alliance's eighth annual Trust Audit and Honor Roll.

Risk-based approach essential to realistic, manageable IT security program

Risk-based approach essential to realistic, manageable IT security program

By

Security and risk are often mentioned in the same breath, and while they can complement each other, taking a risk-based approach is essential to building a realistic and manageable IT security program.

Which IT jobs are most in demand by CISOs?

Which IT jobs are most in demand by CISOs?

By

When it comes to the most in demand positions in IT among CISOs David Foote, CEO of IT market intelligence firm Foote Partners, said it's internal IT "marketers" who can successfully communicate complex cybersecurity concepts to C-level executives.

Top to bottom assurance

Top to bottom assurance

By

When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.

Options surety: Case study

Options surety: Case study

By

The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.

Workplace security awareness programs lacking in efficacy, says study

Workplace security awareness programs lacking in efficacy, says study

By

Just because a company offers a cybersecurity training program to its employees doesn't mean it's necessarily doing enough to change workers' dangerous online behaviors, according to a report from Experian and Ponemon Institute.

Microsoft bans passwords from breach lists

Microsoft bans passwords from breach lists

By

On the heels of a breach last week at LinkedIn that exposed passwords of 117 million users, Microsoft has put in place new password security for users of its Azure Active Directory.

Wekby hacker gang using DNS requests in new malware campaign

Wekby hacker gang using DNS requests in new malware campaign

By

A long-time hacker group is using DNS requests as a command-and-control mechanism in a new series of malware attacks.

Study: Federal agencies still lack strong cyber hygiene practices

Study: Federal agencies still lack strong cyber hygiene practices

By

A new study showing how federal agencies still don't have a firm grasp of cybersecurity practices was ironically released just days after the third-party contractor hired to fortify the U.S. Office of Personnel Management's systems suddenly quit.

Adobe patches Connect untrusted search path vulnerability

Adobe patches Connect untrusted search path vulnerability

By

A security update for Adobe Connect for Windows released Monday resolves an untrusted search path vulnerability in the add-in installer for Connect versions 9.5.2 and earlier.

Destroy your data responsibly! International Recycling Day is 17 May

Destroy your data responsibly! International Recycling Day is 17 May

International Recycling Day is held today, 17 May to caution businesses that being green and responsible recycling is vital to destroy data on disused devices

IT pros in financial services assert ability to detect breaches

IT pros in financial services assert ability to detect breaches

Data breaches in the worlds of banking, credit and finance have nearly double between 2014 and 2015 according to the Identity Theft Resource Centre's 2015 Breach List report. Despite being unsure of how long it would take, IT pros in financial services are very confident in their ability to detect a breach.

Yahoo's second wave of declassified FISC docs spotlights battle with feds over PRISM

Yahoo's second wave of declassified FISC docs spotlights battle with feds over PRISM

By

Yahoo has released its second wave of Foreign Intelligence Surveillance Court (FISC) documents concerning a 2007 case over user data.

Study: Apple, Android should better vet app stores, notify users of 'dead apps'

Study: Apple, Android should better vet app stores, notify users of 'dead apps'

By

Appthority's Q2 2016 Enterprise Mobile Threat Report found Apple and Android should better vet their app stores.

Microsoft report: 9.4 percent increase in vulnerability disclosures

Microsoft report: 9.4 percent increase in vulnerability disclosures

By

Microsoft noted a 9.4 percent increase in vulnerability disclosures to just above 3,300 disclosures in its latest study.

Researchers discover ICS attack method that spreads through networks

Researchers discover ICS attack method that spreads through networks

By

A team of researchers discover a new method of launching attacks that would threaten global critical infrastructure and utility providers through a worm that spreads through utility networks.

Study: 17 percent of IT pros confident they can defeat cyberattacks

Study: 17 percent of IT pros confident they can defeat cyberattacks

By

A recent study found that only 17 percent of IT professionals were confident in their ability to defeat cyberattacks.

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

By

In a series of attacks, University of Michigan researchers hacked into Samsung SmartThings connected home systems and remotely unlocked doors.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US