{"id":1000,"date":"2014-08-28T00:00:00","date_gmt":"2014-08-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2014\/08\/28\/newsalert-august-27-2014\/"},"modified":"2021-12-30T11:38:34","modified_gmt":"2021-12-30T11:38:34","slug":"newsalert-august-27-2014","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2014\/08\/28\/newsalert-august-27-2014\/","title":{"rendered":"Newsalert &#8211; August 27, 2014"},"content":{"rendered":"<p>Three Things CIOs Should Know About Cyber-Security<br \/>\nAt the Information Security Forum, we know that cyber-security is a key business priority as organizations become progressively more digital and cyber-threats grow, both in number and sheer sophistication. With the explosion of today\u2019s digital age, cyber-security is one of the principal issues CIOs. In order to be successful, CIOs must prepare themselves for an always developing cyber-security threat landscape and, with the help of the C-suite, develop a proactive strategy to prepare their organization for today&#8217;s omnipresent dangers.<br \/>\nLink: http:\/\/www.cioinsight.com\/security\/three-things-cios-should-know-about-cyber-security.html<\/p>\n<p>Security vulnerabilities on the decline but risk assessment is often flawed &#8230;<br \/>\nPCWorld<br \/>\n\u201cMany in the industry, including security analysts, corporate incident response teams and enterprise software consumers, have become dissatisfied with scoring inconsistencies that often occur across different organizations,\u201d the X-Force researchers said.<br \/>\nVulnerabilities on the decline, but risk assessment is often flawed, study &#8230;CSO Online<br \/>\nLink: http:\/\/www.pcworld.com\/article\/2599740\/vulnerabilities-on-the-decline-but-risk-assessment-is-often-flawed-study-says-says.html<\/p>\n<p>New malvertising campaign hit visitors of several high-profile sites<br \/>\nThe attack affected visitors to Java.com, Deviantart.com, TMZ.com, Photobucket.com, IBTimes.com, eBay.ie, Kapaza.be and TVgids.nl between Aug. 19 and Aug. 22, according to researchers from Dutch security firm Fox-IT.<br \/>\nLink: http:\/\/www.pcworld.com\/article\/2599680\/new-malvertising-campaign-hit-visitors-of-several-highprofile-sites.html#tk.rss_all<\/p>\n<p> Is Russia Responsible For JPMorgan Hack? FBI Reportedly Opens Probe<br \/>\nThe Federal Bureau of Investigation is looking into a reported Russian cyber-attack on JPMorgan Chase &#038; Co. (NYSE:JPM) and at least one other bank, sources told Bloomberg News. The FBI got involved after a significant breach of corporate computer security was found, the Wall Street Journal reported Wednesday.<br \/>\nLink: http:\/\/www.ibtimes.com\/russia-responsible-jpmorgan-hack-fbi-reportedly-opens-probe-1671732<\/p>\n<p>Intel unveils security controller for software defined data centres<br \/>\nINTEL(McAfee) HAS REVEALED the first product from its Intel Security unit, a programmable security controller designed to be deployed in physical, virtualised and cloud environments in software defined data centre infrastructures.<br \/>\nLink: http:\/\/www.theinquirer.net\/inquirer\/news\/2362100\/intel-unveils-security-controller-for-software-defined-data-centres<\/p>\n<p>Protegrity : Recognized in Gartner Research Report on Protecting Big Data In Hadoop<br \/>\nSTAMFORD, CT&#8211;(Marketwired &#8211; Aug 27, 2014) &#8211;  Protegrity, the leading provider of data-centric enterprise data security solutions, today announced that Gartner Inc. has recognized Protegrity in its July 14, 2014 report, &#8216;Protecting Big Data in Hadoop.&#8217; With its inclusion in the report, Protegrity believes it establishes itself once again as the industry&#8217;s foremost company helping organizations overcome challenges with securing Big Data systems.<br \/>\nLink: http:\/\/www.4-traders.com\/news\/Protegrity&#8211;Recognized-in-Gartner-Research-Report-on-Protecting-Big-Data-In-Hadoop&#8211;18957130\/<\/p>\n<p>Hackers prey on Russian patriotism to grow the Kelihos botnet<br \/>\nDespite the DDoS functionality in some Kelihos malware variants, this new invitation to volunteer computers for attacks against Western government websites is just a ruse to get more systems infected, according to Bogdan Botezatu, a senior e-threat analyst at Bitdefender.<br \/>\nReported on: Techworld.com on Aug 26, 2014, 16:55<br \/>\nLink: http:\/\/news.techworld.com\/security\/3539891\/hackers-prey-on-russian-patriotism-to-grow-the-kelihos-botnet\/?olo=rss<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three Things CIOs Should Know About Cyber-Security At the Information Security Forum, we know that cyber-security is a key business priority as organizations become progressively more digital and cyber-threats grow, both in number and sheer sophistication. With the explosion of today\u2019s digital age, cyber-security is one of the principal issues&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1000","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1000"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1000\/revisions"}],"predecessor-version":[{"id":3487,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1000\/revisions\/3487"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}