There’s no doubt that enterprises are embracing cloud computing, but not-so-surprising that enterprises repeatedly say that they need heightened visibility and security management capabilities so they can more effectively deploy applications, defend against cyberattacks, and mitigate regulatory compliance risks, a recent survey found.
All about Virtualization and Cloud Security | Recent Articles:
Business Insights readers are certainly well aware of the sorry state of connected medical device security. We’ve covered it in posts such as St. Jude Takes Steps to Secure Vulnerable Medical Implants and U.S. DHS and FDA Face Medical Device Security Woes. In the later post we covered how the FDA is working to foster a culture of continuous quality improvement.
In a survey and research, The Future of Hybrid Cloud, highlights that while enterprises are moving to cloud — it’s not a smooth transition as some like to proclaim.
Not too long ago news broke of yet another substantial data breach. This time at financial consultancy Deloitte — one of the so-called big four accounting firms. On Sept 25, Deloitte announced that it had detected a breach stemming from an inadequately secured administrative email system that gave the attacker(s) access to the firm’s global email system.
Security research firm IOActive recently set out to investigate the security of 21 mobile brokerage apps used for trading stocks and other equities. The results were less than reassuring.
If you are a Linux user you might want to keep an extra eye on your systems and be ready to patch — as soon as patches do become available that is. Google researchers this week made public seven vulnerabilities they uncovered in the Linux DNS software package Dnsmasq.
Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system patching levels. The security firm Duo Labs recently set out to study the security of Mac firmware, more specifically the EFI (Extensible Firmware Interface) in Macs for the past three years. Think of EFI as the modern BIOS (Basic Input / Output System) manages the boot process of a computer system as well as communications between the operating system and other devices such as video, keyboard, printers, and mice.
While most eyes interested in cybersecurity for the past two weeks have been focused upon (and for good reason) the Equifax breach, the U.S. Food and Drug Administration (FDA) continued its pressure on medical device manufacturers to build security into product design — just as the U.S. Department of Homeland Security warned the medical community of eight vulnerabilities in Smiths medical wireless infusion pumps.
The second rule of data breaches should be (the first being don’t have one) to stop doing harm. On this account, Experian failed considerably.
We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.
An analysis of healthcare data breaches for the first half of the year shows that the healthcare industry is on the path to suffer more one data breach a day this year.
One doesn’t have to look far to see software is vulnerable, and who better to discuss the perceived state of software security than developers. With that in mind, Netsparker recently conducted a survey that looked at the views of developers on eactly this subject.