Intel Security’s strategy for eliminating cybersecurity fragmentation

At RSA Conference 2017, Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation. The workforce shortage facing the cybersecurity industry makes it increasingly difficult to hire and retain employees. These scarce resources make it harder to maintain a coherent security architecture to prevent damage from and minimize the cost of emerging threats while embracing the potential of new open source, digital, cloud and security technologies. Intel Security’s research … More Continue reading Intel Security’s strategy for eliminating cybersecurity fragmentation

40% of cloud services are commissioned without the involvement of IT

Intel Security released its second annual cloud security report, “Building Trust in a Cloudy Sky,” at RSA Conference 2017. The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of Shadow IT of the more than 2,000 IT professionals surveyed. Trust in the cloud on the rise The trust and perception of public cloud services continues to improve year over year. … More Continue reading 40% of cloud services are commissioned without the involvement of IT

The anti social network

Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people gave it five stars? I refuse to now try something new unless someone has been there before, took the time to review it, and then post it on a social network of some description. Indeed this approach goes even beyond products or services, … More Continue reading The anti social network

Analysis of new Shamoon infections

All of the initial analysis pointed to Shamoon emerging in the Middle East. This however was not the end of the story since the campaign continues to target organizations in the Middle East from a variety of verticals. Indeed reports suggested that a further 15 Shamoon incidents had been reported from public to private sector. Rev.2 campaign Remember the similarities to the original version comment? The code for the new revision was ‘almost’ identical to … More Continue reading Analysis of new Shamoon infections

Family dynamics in a connected world

A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. Today, we are seeing the rise in popularity of the smart home and its connected devices. In fact, Gartner forecasts that “there will be more than 10.5 billion ‘things’ in homes by 2020,” which creates a larger potential risk that the devices and personal data that flow from them … More Continue reading Family dynamics in a connected world

93% of SOC managers unable to triage all potential threats

In mid-2016, Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises use SOCs, how they have changed over time, and what they will look like in the future. Interviews with nearly 400 security practitioners across several countries, industries and company sizes yielded valuable information on the state of the SOC in 2016: Alert overload. On average, organizations are unable to sufficiently investigate 25 percent of their … More Continue reading 93% of SOC managers unable to triage all potential threats

New infosec products of the week​: December 9, 2016

Thales releases advanced encryption solutions for secure docker containers Thales released new capabilities for its Vormetric Data Security Platform. These advances extend data-at-rest security capabilities with integrated Docker encryption and access controls, the ability to encrypt and rekey data without having to take applications offline, FIPS certified remote administration and management of data security policies and protections, and the ability to accelerate the deployment of tokenization, static data masking and application encryption. Unisys Stealth(aware) automates … More Continue reading New infosec products of the week​: December 9, 2016

This year’s most hackable holiday gifts

Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. The most hackable gift category includes laptops and PCs, followed by smartphones and tablets, media players and streaming sticks, smart home automation and devices, and finally, drones. To accompany the list, Intel Security conducted a survey to identify the risky behaviors consumers are engaging in during the holiday season and educate … More Continue reading This year’s most hackable holiday gifts

Stolen medical records available for sale from $0.03 per record

The development of the market for stolen data and related hacking skills indicate that the business of cybercrime in the healthcare sector is growing, according to Intel Security. “In an industry in which the personal is paramount, the loss of trust could be catastrophic to its progress and prospects for success,” said Raj Samani, Intel Security’s CTO for Europe, the Middle East, and Africa. “Given the growing threat to the industry, breach costs ought to … More Continue reading Stolen medical records available for sale from $0.03 per record

13 countries join global ransomware fight

Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together with the private sector. The new members are: Bosnia and Herzegovina, Bulgaria, Colombia, France, Hungary, Ireland, Italy, Latvia, Lithuania, Portugal, Spain, Switzerland and the United Kingdom. More law enforcement agencies and private sector organisations are expected to join the programme in the coming months. Their collaboration will … More Continue reading 13 countries join global ransomware fight