Global information network for senior infosec experts, advocates and thought-leaders - and the C-suite clients who require services and products in this arena.
The links below are for people, supplier companies we focus upon and other matters of relavance.
CLICK THROUGH at your own leisure :-)
Originally written by Nick Ismail on Information Age
Around 30GB of commercially sensitive data has been compromised in a hack on an Australian government contractor, including details about new fighter planes and navy vessels. The data is not classified, the government said, and it doesn’t know if a state was involved. The hackers identity is not known. “It could be one of a
The post “Extensive” hack breaches Australian defence data appeared first on Information Age - Insight and Analysis for IT Leaders.
Last weekend, I had the privilege of returning to my alma mater for the inauguration of Elizabeth H. Bradley, the 11th president of Vassar College. Returning to Vassar as the president of Transylvania University felt different from my arrival as a student in 1984.
I was raised in the Bronx by Irish Catholic immigrants. Our Catholicism was quiet, expressed mostly by giving neighbors a hand, weekly Mass and private guilt. We had little time to follow the political issues of the day, and the internet did not yet exist.
During my years at Vassar, however, there was no hiding from political issues.
Dutch cybersecurity and cloud consultancy QSight IT has been acquired by telecom firm KPN. No terms were disclosed. Previous shareholders in QSightIT including Holland Venture announced today that they have agreed to sell their shares in the company to the telecom firm. “With the acquisition of QSight IT we add a team of highly-skilled security […]
The post KPN acquires Dutch cybersecurity company QSight IT appeared first on Tech.eu.
NEW YORK (Reuters) - There is a widespread sense of fear hanging over consumers in the aftermath of the data breach at credit-monitoring firm Equifax revealed in early September that approximately...
Devices to monitor impact of spoil dumping on marine mammals during Alexandra Basin redevelopment
Personal Tech editor Wilson Rothman explains the importance of two-factor authentication—and its limitations.
Originally written by Nick Ismail on Information Age
Not a single week goes by without seeing an equal amount of articles decrying the gaps in cloud security and articles praising the benefits of the cloud including how much more secure it can be than an organisation’s own data centre. So which is it? And for companies who are trying to define their next
The post The cloud security dilemma appeared first on Information Age - Insight and Analysis for IT Leaders.
Apple has already shared many details on the upcoming Face ID facial recognition feature in the iPhone X through its software engineering chief Craig Federighi, who did several interviews, but now the company has consolidated that information into a new support document and an in-depth security white paper released this morning. [PDF]
If you've been paying attention to Federighi's interviews and all of the Face ID coverage on sites like MacRumors, you may already be familiar with the content of the support document, but it does a good job addressing all common questions and concerns in a single spot.
It outlines the
ENISA could see an expansion of its role to become the focal point for cyber-activities for the 28-country EU bloc.
A study conducted in July by Dimensional Research examined how organizations are addressing the cybersecurity skills gap. Study respondents included 315 IT security professionals at U.S.-based companies with more than 100 employees. According to the study, 93 percent of security professionals are concerned about the cybersecurity skills gap, and 72 percent believe it is more difficult to hire skilled security staff to defend against today’s complex cyberattacks compared to two years ago. Significantly, 81 percent … More →
Latest report finds insider threats come a close second
Government officials and corporate executives alike realize that technology has become a globally connected, booming industry. Despite what that fact may mean for the American intelligence and national security supply chain, agencies must embrace it because the U.S. government isn’t the R&D powerhouse it was many decades ago. “That’s already the way of the world. […]
The post Adapt or die: The national security implications of a globalized tech market appeared first on Fedscoop.
Equifax earlier on Thursday revealed a massive data breach of 143 million consumers.
Just the usual procession of firmware vulnerabilities Infosec consulting firm Nomotion has reported vulnerabilities in Arris broadband modems and which it says are trivial to exploit, and could affect nearly 140,000 devices.…
Equifax mega-breach provides everything an identity thief needs
In a landmark judgement concerning privacy in the workplace, the grand chamber of the European Court of Human Rights (ECHR) has ruled that companies must give employees prior warning if they are monitoring their electronic communications. Read More
AFS Technologies shares its experience of helping Carlsberg realise its ambition for perfect store execution through its software.
The post The benefits of applying ‘the perfect store’, big data and IoT appeared first on FoodBev Media.
Oftentimes companies wait until they grow to a certain size or have a full technology stack before they begin thinking seriously about security. The problem with this is that, statistically, it’s a matter of when you will have a security problem, not if. So our observation is: If you wait until your company reaches some […]
Getty Images Alt Text
Heart patients in US and abroad risk attack due to security flaw
Thursday, August 31, 2017 - 3:56pm
Chubb has broadened its enterprise risk management options for Chubb commercial cyber policyholders in the United States and Canada. Two new policy forms, Cyber Enterprise Risk Management (Cyber ERM) and DigiTech Enterprise Risk Management (DigiTech ERM), combine cyber insurance with …