Cybersecurity Survey Reveals Endpoint Risk Five Times Bigger Than Cloud or Networks

Cybersecurity Survey Reveals Endpoint Risk Five Times Bigger Than Cloud or Networks

Cybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled. Black Hat 2015: State of Security, released by Bromiun Inc. yesterday, also reveals that a large number of businesses find the implementation of patches for “zero-day vulnerabilities” in the software they are using (including Internet browsers…

Blocking The Cloud – Ad Blocking Profits & Pitfalls

Blocking The Cloud – Ad Blocking Profits & Pitfalls

Ad Blocking Profits & Pitfalls A German court recently ruled that ad blocking software is legal, with Adblock Plus beating out Die Zeit and Handelsblatt claims that their plug-in is anti-competitive. While ad blocking does cause considerable strain for online publishers and marketers, Adblock has encouraged advertisers and content creators to work with them to create non-intrusive and useful advertising. Handelsblatt, however, states that ad blocking “is an inadmissible and anti-competitive practice“, and followed the…

Veracode Recognized as a “Leader” in Gartner Magic Quadrant for Application Security Testing

Veracode Recognized as a “Leader” in Gartner Magic Quadrant for Application Security Testing

 Veracode Well-Known for Its Scalable Cloud-Based Service, Ongoing Innovation and Expertise BURLINGTON, MA–(Marketwired – Aug 10, 2015) – Veracode, a leader in protecting enterprises from today’s pervasive web and mobile application threats, today announced that it has been positioned in the “Leaders” quadrant of Gartner Inc.’s 2015 “Application Security Testing Magic Quadrant1” for the third consecutive year, based on the company’s completeness of vision and ability to execute in the application security testing (AST) market.…

General Electric’s Predix Cloud – Building IoT Applications

General Electric’s Predix Cloud – Building IoT Applications

General Electric’s Predix Cloud This week, General Electric has launched its first hosted cloud service. Designed for building applications for the Internet of Things, GE has differentiated itself from market-dominating services such as Amazon’s AWS by targeting the industrial market, and will be focusing on applications related to medical equipment, jet engines, wind turbines, and locomotives. Named Predix Cloud, this product is an addition to GE’s Predix developer tools, initially designed for use only with…

Global Leaders In Malware And Malicious C2 Traffic

Global Leaders In Malware And Malicious C2 Traffic

Malware and Malicious C2 Traffic Nearly half of all malware threats in the past three months originated in the US, while both the US and China are global leaders when it comes to malicious command and control (C2) traffic. This was revealed in the latest quarterly report from NTT Group security company Solutionary released this week. Solutionary researchers analyze global threat trends on an ongoing basis, and provide reliable information about the sources of attacks…

Domain Shadowing – Wild West Of Internet Cyber Attacks

Domain Shadowing – Wild West Of Internet Cyber Attacks

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from Bromium Labs, security analysts, that study key trends in the cyber attack landscape and specialize in innovative technologies aimed to defend and counter advanced attacks against computer networks, warns that hackers prey on popular websites…

Smart Watches And Cyber Security Concerns

Smart Watches And Cyber Security Concerns

Smart Watches Vulnerable To Cyber-Attack The recent epidemic of cyber attacks has led to increased investment and spending on security. But still, hackers have the upper hand. They can hack your computer, mobile, iPad, Internet-connected vehicle, and even your smart watch. According to HP, Smart watches with network and communication functionality represent a new and open frontier for cyber attack. The study, which was conducted by HP Fortify, found that smart watches are significantly vulnerable…

Cloud Security Alliance (CSA) Las Vegas Security Event

Cloud Security Alliance (CSA) Las Vegas Security Event

Keynotes Set For Upcoming Cloud Security Alliance Congress Schedule of Workshops, Trainings and Certifications to Compliment Session Line Up at the only Data Privacy and Cloud Security Conference Featuring Best-in-Class Education and Networking The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the keynote presenters and session line up for the upcoming CSA Congress US at…