Table of Contents Scanning Code for Viruses Is No Longer a Job for Humans No More Ransom: Law Enforcement and IT Security Companies Join Forces to Fight Ransomware Cybersecurity firm offers users reimbursement for ransomware infections DEFCON CYBER™ Joins FireEye Cyber Security Coalition How to ensure your A.I. gets good…
Month: July 2016
IT Security News – 2016-07-27
Table of Contents Australian firms face growing cyber litigation threat As Biometric Scanning Use Grows, So Does Security Risk Researchers Struggle to Determine True Cost of Data Breaches Here are the key security features arriving with Windows 10 next week Senate body approves controversial cyber-crime bill [ISLAMABAD] Ransomware 2.0 is…
IR News Security – 2017-07-26
Table of Contents DEFCON CYBER™ Joins FireEye Cyber Security Coalition Digital Forensics – A Presentation In The Courts California sets cybersecurity example for states to follow California sets cybersecurity example for states to follow Joint Task Force: Forensics and Anti-Forensics Digital response teams need full access to data to prevent…
IT Security News – 2017-07-11
Table of Contents How to handle security risks in Red Hat virtualization environments Google is already fighting hackers from the future with post-quantum cryptography If My Website Is Hacked and Customer Data Exposed, Am I Liable? Business travellers putting organisations' cyber-security at risk Protecting a BIT of Integrity BYTES Global…
Security Industry News – 2016-07-10
Table of Contents Novosco buys UK IT security services firm NetDef Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report Thai companies beef up security as malware threats evolve Kaspersky ATM security solution promises big malware defense in a small package Cybersecurity firms step up intel…
IT Security News – 2017-07-08
Table of Contents Commission boosts cybersecurity industry and steps up efforts to tackle cyber-threats Endpoint and Network Security: The rise of “Defense in Depth” EU to invest €450 million in cybersecurity partnership fund The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges Password…