background preloader

Cyber Security

Facebook Twitter

Our Customers - Velona Systems. We help enterprises already providing communications or cyber security solutions to their own end customers to achieve best-in-class reputation for VoIP Security.

Our Customers - Velona Systems

Communications Service Providers (CSPs) Operators, Telecommunications Re-sellers, Integrators We empower CSPs to give Enterprises peace of mind by allowing them check they have the best possible VoIP Security configured whenever they want, and to put in place real-time dedicated VoIP detection & protection on their voice communications traffic. We allow CSPs to speedily turn on and off VoIP test resources when it comes to validating their own systems ahead of launch or after an upgrade, of when undergoing a new Vendor selection. Insider Threat Detection.

Trust as a Service

Noteworthy Cyber Security Statistics - CyberArk. Securing privileged accounts and credentials must be at the top of the enterprise security agenda, and we’ve previously highlighted five top reasons why on CyberArk’s blog.

Noteworthy Cyber Security Statistics - CyberArk

With the launch of a new year, it’s a good time to be mindful of the lessons learned in 2016. The cyber security industry is chock-full of reports and surveys that continually provide new insights and stats. Privilege is the road most traveled in advanced attacks – that remains a constant. The sophistication of breaches, the amount of data stolen or compromised, the cost of remediation etc. continues to evolve and advance. Cybersecurity Archives - Broader Perspectives. Google Online Security Blog: Project Wycheproof. Posted by Daniel Bleichenbacher, Security Engineer and Thai Duong, Security Engineer We’re excited to announce the release of Project Wycheproof, a set of security tests that check cryptographic software libraries for known weaknesses.

Google Online Security Blog: Project Wycheproof

FortiGuard Services Application Control. Improve security and meet compliance with easy enforcement of your acceptable use policy through unmatched, real-time visibility into the applications your users are running.

FortiGuard Services Application Control

With FortiGuard Application Control, you can quickly create policies to allow, deny, or restrict access to applications or entire categories of applications. Application Control is available as part of the NGFW service through the FortiGate next generation firewall and is a part of why Fortinet tied for the highest overall security effectiveness at 99.97% in the 2016 NGFW security tests from NSS Labs.

Insurance

Index. Secure Trading hires reformed hacktivist to consult on blockchain p... Secure Trading, the payments and cyber security group, has today announced the appointment of reformed hacktivist and renowned cyber security expert, Mustafa Al Bassam.

Secure Trading hires reformed hacktivist to consult on blockchain p...

Mustafa will act as a security advisor on the company’s technology and services, including its new blockchain research project codenamed ‘Trustery’, which aims to commercialise blockchain technologies to improve the visibility and security of online payments. Joining the company part-time while continuing his computer science degree at King’s College London, Mustafa will be working alongside Secure Trading’s senior management team including Chairman and founder Kobus Paulsen, CTO Ian Hughes, and COO Gerald Kitchen. A former member of the hacking group LulzSec, operating under the name tFlow at the age of 16, Mustafa is now reformed and is a sought after security expert with a special focus on financial services.

“Working with Secure Trading I want to develop tools to make online payments safer,” said Mustafa. SQLCipher - Zetetic. SQLCipher has a small footprint and great performance so it’s ideal for protecting embedded application databases and is well suited for mobile development.

SQLCipher - Zetetic

Blazing fast performance with as little as 5-15% overhead for encryption 100% of data in the database file is encrypted Uses good security practices (CBC mode, key derivation) Zero-configuration and application level cryptography Algorithms provided by the peer reviewed OpenSSL crypto library. Cyber-security Information Sharing Partnership (CiSP) - NCSC Site. Already a member?

Cyber-security Information Sharing Partnership (CiSP) - NCSC Site

Sign in Not yet a member? Becoming a member of CISP requires a two-step process: 1. Your organisation needs to join CiSP. Register your organisation. Cyber Essentials - OFFICIAL SITE. The Cyber Essentials scheme provides businesses small and large with clarity on good basic cyber security practice.

Cyber Essentials - OFFICIAL SITE

By focusing on basic cyber hygiene, your company will be better protected from the most common cyber threats. Cyber Essentials is for all organisations, of all sizes, and in all sectors - we encourage all to adopt the requirements as appropriate to their business. This is not limited to companies in the private sector, but is also applicable to universities, charities, and public sector organisations. Cyber Essentials is mandatory for central government contracts advertised after 1 October 2014 which involve handling personal information and providing certain ICT products and services. NCSC Site. VocaLink Connect - VocaLink triumphs at the Cyber Security Awards.

VocaLink's campaign, which was launched to raise employee awareness of the various forms of cyber threats that the company is exposed to on a daily basis, was celebrated for its pioneering approach to cyber security.

VocaLink Connect - VocaLink triumphs at the Cyber Security Awards

VocaLink was shortlisted alongside a number of companies, before winning the coveted award, in a highly competitive category. Phil Westgarth, Interim Director of Security at VocaLink, commented: “We are delighted to have received this award. IBM Watson Brings AI Wonders to Cybersecurity. After dominating its human competitors on the television gameshow Jeopardy!

IBM Watson Brings AI Wonders to Cybersecurity

, IBM’s artificial intelligence platform Watson began dabbling with healthcare, pharmaceuticals, finance, education—even cooking. Now the machine is dipping its (robot) toes into the cybersecurity business. Dropbox hack 'affected 68 million users' Image copyright dropbox A Dropbox security breach in 2012 has affected more than 68 million account holders, according to security experts. Last week, Dropbox reset all passwords that had remained unchanged since mid-2012 "as a preventive measure".

Secure Content Delivery, DDOS and WAF Service. Online rental fraud rising steeply. Rental fraud is rising sharply, the BBC has learned during an investigation in which it confronted two online fraudsters for their crimes. Scam artists offer cheap flats for rental, demanding instant deposits. But they do not actually own the homes - and would-be tenants' cash is lost. Reports of rental fraud in England and Wales leapt from 2,216 in 2014 to 3,193 in 2015. BBC researchers posed as tenants to expose tricks used by fake landlords. Google. Second bank cyber-attack detected by Swift after Bangladesh raid. Image copyright Thinkstock A cyber-attack, similar to one that saw $81m (£56m) stolen from Bangladesh's central bank, has hit a second bank.

The warning about the second attack came from Swift, which oversees the financial messaging network that underpins global money transfers. Swift said the target was a commercial bank but did not name the organisation or reveal if any cash had been taken. The attack used techniques and tools resembling those used to steal cash from Bangladesh in February, it said.

Swift is used by about 11,000 financial institutions around the world to move large amounts of cash. Security snapshot reveals massive personal data loss. Image copyright Reuters More than 500 million digital identities were stolen or exposed in 2015, suggests a report from security firm Symantec. In addition, it said, fake technical support scams rose by 200% and crypto-based ransomware attacks grew by 35%. Hackers also made more use of unknown software bugs to make sure attacks work, said the annual threat report. It said the gangs behind the attacks had become more professional and now resembled legitimate software firms. "They have extensive resources and highly skilled technical staff that operate with such efficiency that they maintain normal business hours and even take the weekends and holidays off," said Kevin Haley, director of Symantec security response in a statement.