The hidden costs of data breaches

The average cost of a data breach is $3.86 million globally. That is a 6.4 percent increase from 2017, a newly released report revealed. The Cost of a Data Breach 2018 conducted by Ponemon Institute and sponsored by IBM Security found the cost of data breaches on a business’ bottom line has been steadily increasing … continue reading

SD Times news digest: Linux Foundation releases open-source jobs report, Android Studio 3.2 beta and Rust 1.27

The Linux Foundation in collaboration with Dice.com has revealed the 2018 Open Source Jobs Report. The report is designed to examine trends in open-source careers as well as find out which skills are the most in demand. Key findings included 83 percent of hiring managers believes hiring open source talet is a priority and Linux … continue reading

SD Times news digest: Amazon adds memory to Alexa, Oath pays $400,000 to hackers, Google launches new credits program for researchers, Linux Foundation welcomes 41 new members

Amazon had announced the addition of memory capabilities to its artificial intelligence, Alexa. It can remember any information for you so that you will not forget. The company also plans to add deep learning models to the spoken language understanding of Alexa. “We’ve only begun to scratch the surface of what’s possible,” said Ruhi Sarikaya … continue reading

Sparx Systems Enterprise Architect

Cyberextortion: A growing Internet problem

“If you’re gonna commit a crime,” as “Slick Willie” Sutton said when asked why he robbed banks, “That’s where the money is.” Also known as “Willie the Actor” for his ability to disguise himself, Sutton stole an estimated $2 million during his 40-year robbery career. Modern-day cyber criminals have adopted this approach to digital extortion … continue reading

Bracket tackles modern hack attacks with new immutable server protection

Bracket Computing is releasing a new solution to defend against persistent attackers. The company announced Server Guard, a new security solution that runs outside an operating system and prevents rootkit attacks. “Traditional perimeter and detection-oriented defenses can’t stop the most persistent attacks. And once they penetrate the OS, they’re undetectable—for months,” the company wrote on … continue reading

How your security budget helps hackers win

When a single breach can cause untold damage to your business, from millions in losses to reputational damage, operational disruption, and lost trust, you want to align your security budget with the actual threats you face. So why does the typical company allocate less than 3% of its security budget to application security—when a full 30% of successful breaches … continue reading

Researchers: SAP Point-of-Sale systems vulnerable to attack

There are many ways hackers can exploit vulnerabilities to get the information they want. Flaws in Point-of-Sale (PoS) systems is on this list, and ERPScan researchers recently found that PoS software distributed by German vendor SAP is missing crucial checks that leave it vulnerable to unauthorized access and modification. A video demonstration by the research team shows a … continue reading

SD Times GitHub project of the week: Awesome Hacking

When we hear the word hacker today, our minds often wander. We end up picturing a creepy person in dark clothing, in a dark room, maliciously gaining unauthorized access to systems in corporations and governments. While hacker is synonymous with “criminal” or “bad-guy/girl,” there are all kind of hackers in the hacker community. A trending GitHub … continue reading

Have I been Pwned? PyTorch v0.2.0, and new vulnerability data from Netsparker — SD Times news digest: August 7, 2017

Troy Hunt, a Microsoft regional director and security guru, released 320 million freely downloadable “Pwned Passwords” to shed light on how many real-world passwords have been exposed in data breaches. The service was created after NIST released guidance recommending that user-provided passwords be checked against existing data breaches. “My hope is that an easily accessible … continue reading

Apollo Server 1.0, GitHub’s Internet Bug Bounty donation, and the Google Cloud Platform — SD Times news digest: July 21, 2017

A new GraphQL server is now available for all Node.js frameworks. Apollo Server is a open-source GraphQL server that is community-maintained and works across: Express, Connect, Hapi, Joa, AWS Lambda, Restify and Micro. The Apollo team announced version 1.0 of the server this week. It is built for the community, for simplicity and for performance. … continue reading

Distil introduces API security solution to defend against bots

Distil Networks is protecting the web from malicious bots with its newly announced Bot Defense for API solution. Bot Defense is designed to prevent malicious bots from accessing the API servers powering public-facing websites and mobile apps. “While usage of APIs to drive web and mobile apps is exploding, the security of those APIs remains … continue reading

Digital Experience: All eyes on cybersecurity solutions

New York’s plan to ramp up cybersecurity fit in with the overall tone of last night’s Pepcom Digital Experience event, held at the Metropolitan Pavilion in the city, proving that businesses are innovating on all security fronts. Whether it’s a device to protect hackers from getting into your devices, or it’s software to safeguard your … continue reading

HTML Snippets Powered By : XYZScripts.com