Social Network For Security Executives: Help Make Right Cyber Security Decisions
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Ninety-nine percent of the enterprise workforce currently uses mobile devices - smart phones and tablets - to perform their jobs today. And nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits.…Continue
Added by Gireesh Kumar on February 28, 2017 at 3:00pm — No Comments
Faced with the risk of cyberattacks, the prospect of losing data and the potential for large fines, the private sector has turned to the insurance industry to protect against losses arising from all manner of information security incidents. Research from CFC Underwriting shows a 50% growth in demand for cyberinsurance last year and the firm expects continued high demand for cyber insurance products in 2017.
The cyberinsurance industry is growing quickly as a result. Allianz estimates…Continue
Added by pritha on February 22, 2017 at 12:00pm — No Comments
In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also be more responsive than the attacker or malware can morph and be concealed. In the world of small networks (1-100 nodes), this is not a particularly oppressive challenge with the old methodologies, tools, and procedures. In midsize to large-scale…Continue
Added by pritha on February 21, 2017 at 10:00am — No Comments
Internet of Things (IoT) has been gaining prominence in the consumer space in the last few years by redefining business-to-consumer (B2C) markets such as smart homes, media, infotainment, retail, financial services and so on. This IoT revolution has the potential to dramatically alter manufacturing, energy, agriculture, transportation and other industrial sectors of the global economy in the next decade. Termed as the…Continue
Added by Vishwas on February 18, 2017 at 3:58pm — No Comments
With millions of Bluetooth Low Energy (BLE) IoT devices deployed per year, comes the responsibility to secure them. BLE was designed for low power personal area networks. Security was not a focus while designing it. But nowadays, BLE devices are an important part of IoT networks where these can be a matter of life and death.
There are two types of IoT architecture using BLE:
1. BLE device sends data to the…Continue
Added by Amit Chahar on February 18, 2017 at 3:30pm — No Comments
Two of the most talked about technologies in today's world are blockchain and IoT. They are at the initial stage of maturity and there are lot of activities taking place in development of them and finding interesting uses of the technologies. One of the key challenges of IoT world is security. In this article my attempt is to critically view the use of blockchain technology to secure IoT.
The article starts with giving a very brief primer on blockchain followed by explaining the…Continue
Added by Arnab Chattopadhayay on February 18, 2017 at 3:30pm — No Comments
IoT security is being approached by many organizations and from different perspectives . In this post we give a birds eye view of the players.This is not intended to be comprehensive. We will supplement this in time with deeper dive at different layers of the ISO 7 layer model.…Continue
Added by Arvind Tiwary on February 18, 2017 at 3:30pm — No Comments
Connected vehicle technology potentially increases driving safety and efficiency through its ability to communicate with the internet and other automobiles
Consumer demands features range from Bluetooth, Wi-Fi, cellular network connections, keyless entry systems, to…Continue
Added by Rahul M on February 18, 2017 at 3:30pm — No Comments
This is a list of various use cases of IoT. Some of them have been detailed, because of current or potential challenges and usage trends.
There are two types of systems: old systems with hardly any/nil instrumentation, and the relatively new ones with instruments which generate lot of data using automation systems, robots, NC machines, PLCs, digital gauges, cameras, sensors, wireless tools and others…Continue
Added by N Katariya on February 18, 2017 at 3:00pm — No Comments
A typical architecture of an IoT solution consists of constrained devices, gateways or border routers and the cloud platform. On a high level architecture perspective there are two types of devices: constrained devices and gateway-like devices.
Added by Nagasai on February 18, 2017 at 2:30pm — No Comments
This article gives a 5 principal steps and questions one must solicit the emergency from the cyber security incident response steps. This includes the incident, the control points, plan of action, communication, business impacts.…Continue
Added by pritha on February 18, 2017 at 12:30pm — No Comments
Last year, cybercriminals attacked the California-based Hollywood Presbyterian Medical Center, encrypting files crucial in running the hospital’s operating systems and demanding a ransome to restore them to working order. The scam worked – after 10 days of futility, the hospital surrendered and paid $17,000 to regain system control.…Continue
Added by Amit Jaokar on February 17, 2017 at 1:30pm — No Comments
The new Spora ransomware strain has now been dissected by more malware researchers and the team from G Data discovered that Spora uses an "innovative" way to spread itself via USB sticks. This strain is highly sophisticated and could become the "New Locky".
Spora has well-implemented encryption procedures that do not need a Command & Control server, a user-friendly payment site, choice of different “packages” that victims can opt for including immunity from future attacks, and…Continue
Added by pritha on February 17, 2017 at 10:00am — No Comments
Ransomware is a type of malware that encrypts everything on your system with a cryptographic algorithm and holds that encrypted data hostage for ransom. It demands the user to pay for the decryption key. There are two types of ransomware. The first type encrypts all data on the system and renders it nearly impossible to decrypt without the key. The second type simply locks the system and demands to enter the key for data decryption but does not encrypt data itself.…Continue
Added by pritha on February 16, 2017 at 1:30pm — No Comments
RSA conference is one of the leading security conferences worldwide with 700+ vendors at the Expo, which creates some unique challenges for security professionals. Some of the challenges @RSAC Expo are as below:
Added by Amit, CISO Platform on February 15, 2017 at 5:00pm — No Comments