Topic: cybersecurity

Guest View: CEOs — The biggest shadow IT threat?

Chances are high that your business is home to shadow IT. The practice of using unsanctioned software on company devices isn’t done out of malice. It’s quite the opposite — users are turning to unapproved applications like chat apps, task managers, or collaboration tools in an effort to be more productive. While the intentions of … continue reading

Cyberextortion: A growing Internet problem

“If you’re gonna commit a crime,” as “Slick Willie” Sutton said when asked why he robbed banks, “That’s where the money is.” Also known as “Willie the Actor” for his ability to disguise himself, Sutton stole an estimated $2 million during his 40-year robbery career. Modern-day cyber criminals have adopted this approach to digital extortion … continue reading

SD Times news digest: SEC approves guidance, Google Android Enterprise Recommendation and SnapLogic updates cloud platform

The Securities and Exchange Commission (SEC) has unanimously voted to approve a statement that assists public companies in preparing disclosures about cybersecurity risks and incidents. This addresses the importance of cybersecurity policies and procedures. “I believe that providing the Commission’s views on these matters will promote clearer and more robust disclosure by companies about cybersecurity … continue reading

SD Times news digest: Red Hat Decision Manger 7, Apache NetBeans 9.0 beta, and new cybersecurity task force

Red Hat has released Decision Manager 7, its low-code development solution for business rules. Decision Manager is designed to allows citizen developers to build applications that automate business decisions. “It’s entirely possible to create a fully working application purely by creating the business rules in Decision Manager,” said Phil Simpson, JBoss product marketing manager at … continue reading

SEC’s 6-year-old cybersecurity guidance slated for major update

The U.S. Securities and Exchange Commission (SEC) is updating its cybersecurity guidance that provides information on how publicly traded companies should report data breaches to their investors. The updates are expected to take effect in the first and second quarter of this year, and it will require that investors are notified of all data breaches, … continue reading

Report: 2017 was the worst year ever in terms of cybersecurity attacks

Cyber attacks targeting businesses nearly doubled in the past year. A new report, the Cyber Incident & Breach Trends Report, released by the Online Trust Alliance (OTA) found 156,700 cyber incidents last year, compared to 82,000 in 2016. The OTA is a Internet Society initiative designed to improve online trust.   The organization believes that since a … continue reading

SD Times news digest: Windows Desktop App Analytics, IBM and Mendix’s low code partnership, and Alphabet’s Chronicle

Microsoft has announced the release of the Windows Desktop Program. The program is designed to give developers insight into how their desktop apps without having to cobble together a bunch of tools. The new program provides detailed information about how apps are performing, and identifies any bugs or issues that may hurt the user experience. … continue reading

CSCC: 10 steps to ensure security for cloud computing success

The Cloud Standards Customer Council (CSCC) announced version 3 of its Security for Cloud Computing: 10 Steps to Ensure Success. The 10 steps are meant to be a reference guide for organizations to better analyze the security effects of cloud computing on the organization as a whole. According to the CSCC, cloud security risks include … continue reading

SD Times news digest: BlackBerry’s Jarvis, MicroStrategy’s data connectors, and Go support in AWS Lambda

BlackBerry is releasing a new cybersecurity software solution. BlackBerry CEO and Executive Chairman and CEO, John Chen, presented BlackBerry Jarvis in a keynote address at the North American International Automotive Show. Starting off, Jarvis will be marked to the automotive industry, and become applicable to other industry other industry segments such as healthcare, industrial automation, aerospace, and … continue reading

The importance of OAuth 2.0

“There’s an app for that,” but not all apps are created equal. Users expect there to be an endless amount of applications to make their lives easier, but they forget to take into account what kind of security measures those applications provide. In addition, these applications and services often connect to other applications and services, … continue reading

Bugcrowd: Young cybersecurity professionals are turning to bug hunting

Hackers are getting an earlier start when it comes to bug hunting careers, according to a new report. Bugcrowd has released its second annual report, Inside the Mind of a Hacker 2.0, which details the demographics and motivations of the bug hunting community. The report found that bug bounty programs are up more than 77 percent … continue reading

How your security budget helps hackers win

When a single breach can cause untold damage to your business, from millions in losses to reputational damage, operational disruption, and lost trust, you want to align your security budget with the actual threats you face. So why does the typical company allocate less than 3% of its security budget to application security—when a full 30% of successful breaches … continue reading

DMCA.com Protection Status