background preloader

Cyber Security

Facebook Twitter

Trust as a Service

Noteworthy Cyber Security Statistics - CyberArk. Securing privileged accounts and credentials must be at the top of the enterprise security agenda, and we’ve previously highlighted five top reasons why on CyberArk’s blog.

Noteworthy Cyber Security Statistics - CyberArk

With the launch of a new year, it’s a good time to be mindful of the lessons learned in 2016. The cyber security industry is chock-full of reports and surveys that continually provide new insights and stats. Privilege is the road most traveled in advanced attacks – that remains a constant. The sophistication of breaches, the amount of data stolen or compromised, the cost of remediation etc. continues to evolve and advance. Cybersecurity Archives - Broader Perspectives. Google Online Security Blog: Project Wycheproof. Posted by Daniel Bleichenbacher, Security Engineer and Thai Duong, Security Engineer We’re excited to announce the release of Project Wycheproof, a set of security tests that check cryptographic software libraries for known weaknesses.

Google Online Security Blog: Project Wycheproof

We’ve developed over 80 test cases which have uncovered more than 40 security bugs (some tests or bugs are not open sourced today, as they are being fixed by vendors). For example, we found that we could recover the private key of widely-used DSA and ECDHC implementations. We also provide ready-to-use tools to check Java Cryptography Architecture providers such as Bouncy Castle and the default providers in OpenJDK.

FortiGuard Services Application Control. Improve security and meet compliance with easy enforcement of your acceptable use policy through unmatched, real-time visibility into the applications your users are running.

FortiGuard Services Application Control

With FortiGuard Application Control, you can quickly create policies to allow, deny, or restrict access to applications or entire categories of applications. Application Control is available as part of the NGFW service through the FortiGate next generation firewall and is a part of why Fortinet tied for the highest overall security effectiveness at 99.97% in the 2016 NGFW security tests from NSS Labs. Conventional firewalls that only identify ports, protocols, and IP addresses can’t identify and control applications, but a next generation firewall can.

Insurance

Index. Secure Trading hires reformed hacktivist to consult on blockchain p... SQLCipher - Zetetic. SQLCipher has a small footprint and great performance so it’s ideal for protecting embedded application databases and is well suited for mobile development.

SQLCipher - Zetetic

Blazing fast performance with as little as 5-15% overhead for encryption 100% of data in the database file is encrypted Uses good security practices (CBC mode, key derivation) Zero-configuration and application level cryptography Algorithms provided by the peer reviewed OpenSSL crypto library. Cyber-security Information Sharing Partnership (CiSP) - NCSC Site. Already a member?

Cyber-security Information Sharing Partnership (CiSP) - NCSC Site

Sign in Not yet a member? Becoming a member of CISP requires a two-step process: 1. Your organisation needs to join CiSP. Register your organisation 2. Register yourself To become a registered CiSP member you must be: a UK registered company or other legal entity which is responsible for the administration of an electronic communications network in the UK sponsored by either a government department, existing CiSP member, or a trade body/association. Cyber Essentials - OFFICIAL SITE. The Cyber Essentials scheme provides businesses small and large with clarity on good basic cyber security practice.

Cyber Essentials - OFFICIAL SITE

By focusing on basic cyber hygiene, your company will be better protected from the most common cyber threats. Cyber Essentials is for all organisations, of all sizes, and in all sectors - we encourage all to adopt the requirements as appropriate to their business. This is not limited to companies in the private sector, but is also applicable to universities, charities, and public sector organisations.

Cyber Essentials is mandatory for central government contracts advertised after 1 October 2014 which involve handling personal information and providing certain ICT products and services. NCSC Site. VocaLink Connect - VocaLink triumphs at the Cyber Security Awards. VocaLink's campaign, which was launched to raise employee awareness of the various forms of cyber threats that the company is exposed to on a daily basis, was celebrated for its pioneering approach to cyber security.

VocaLink Connect - VocaLink triumphs at the Cyber Security Awards

VocaLink was shortlisted alongside a number of companies, before winning the coveted award, in a highly competitive category. IBM Watson Brings AI Wonders to Cybersecurity. After dominating its human competitors on the television gameshow Jeopardy!

IBM Watson Brings AI Wonders to Cybersecurity

, IBM’s artificial intelligence platform Watson began dabbling with healthcare, pharmaceuticals, finance, education—even cooking. Now the machine is dipping its (robot) toes into the cybersecurity business. Ginni Rometty, CEO of IBM ibm , will introduce a cybersecurity-specific version of Watson at an IBM computer security summit on Tuesday, the company said. The project, powered by IBM’s Bluemix cloud computing platform, includes a partnership between IBM and eight universities that begins in the fall. Some of the schools include the Massachusetts Institute of Technology, New York University, and Pennsylvania State University. Dropbox hack 'affected 68 million users' Image copyright dropbox A Dropbox security breach in 2012 has affected more than 68 million account holders, according to security experts.

Dropbox hack 'affected 68 million users'

Secure Content Delivery, DDOS and WAF Service. Online rental fraud rising steeply. Rental fraud is rising sharply, the BBC has learned during an investigation in which it confronted two online fraudsters for their crimes.

Online rental fraud rising steeply

Scam artists offer cheap flats for rental, demanding instant deposits. But they do not actually own the homes - and would-be tenants' cash is lost. Reports of rental fraud in England and Wales leapt from 2,216 in 2014 to 3,193 in 2015. BBC researchers posed as tenants to expose tricks used by fake landlords. More news on this and other stories from London One advert fraudsters attempted to place on the flat-sharing website EasyRoomMate offered a plush Kensington apartment for just £700 per month, far below the market rate.

Google. Second bank cyber-attack detected by Swift after Bangladesh raid. Image copyright Thinkstock A cyber-attack, similar to one that saw $81m (£56m) stolen from Bangladesh's central bank, has hit a second bank. The warning about the second attack came from Swift, which oversees the financial messaging network that underpins global money transfers. Swift said the target was a commercial bank but did not name the organisation or reveal if any cash had been taken. Security snapshot reveals massive personal data loss. Image copyright Reuters More than 500 million digital identities were stolen or exposed in 2015, suggests a report from security firm Symantec.

In addition, it said, fake technical support scams rose by 200% and crypto-based ransomware attacks grew by 35%. Hackers also made more use of unknown software bugs to make sure attacks work, said the annual threat report.