Information Security

Type: Keyphrase
Name: Information Security
First reported 23 mins ago - Updated 23 mins ago - 1 reports

Data date

The new EU Data Protection Regulation will be making greater demands on organisations to notify of data breaches and deliver effective incident management, says BCS , the Chartered Institute for IT.To help examine some of the consequences of the new regulation ... [Published Professional Security - 23 mins ago]
First reported 53 mins ago - Updated 53 mins ago - 1 reports

TraceSecurity announces integration with Tenable Network Security

TraceSecurity, a provider of cloud-based security solutions, has announced integration with Tenable Network Security allowing organizations to leverage their investments in Nessus, a vulnerability scanner developed by Tenable Network, when deploying cloud-based ... [Published Individual.com - 53 mins ago]
First reported 2 hours ago - Updated 2 hours ago - 1 reports

Richard Horne, PwC cyber partner, comments on cyber threats to financial sector;

"In today's digital world, cyber attacks against the financial sector are constantly on the rise, with data breaches in the global financial sector tripling to nearly 4,628 last year.* The threat from cyber attacks can't be ignored, whether from nation ... [Published Noodls - 2 hours ago]
First reported 3 hours ago - Updated 3 hours ago - 1 reports

Movers and makers: September-October

The latest news on the people and companies at the forefront of information security. ... [Published Latest articles from SC Magazine UK News - 3 hours ago]
First reported 4 hours ago - Updated 4 hours ago - 1 reports

IT Governance makes new EU data protection and cyber security guidance available online

IT Governance has just published data protection and cyber security content on their European website.BRUSSELS, BELGIUM, August 26, 2014 / EINPresswire.com / -- IT Governance, the global leaders in IT governance, risk management and compliance (IT-GRC), ... [Published Ein News - 4 hours ago]
First reported 10 hours ago - Updated 5 hours ago - 3 reports

PCIDSS recertifies Sterling Bank

THE Council of Payment Card Industry (PCI) has recertified Sterling Bank Plc barely one year after it was certified by the Council.The development was in recognition of its compliance with standard practice in cards management and having implemented all ... [Published The Guardian Nigeria - 6 hours ago]
First reported 6 hours ago - Updated 6 hours ago - 1 reports

RVAsec - David Kennedy - 2014 Keynote

David is the Founder and Principal Security Consultant for TrustedSec, who provides information security consulting services for a large portion of the Fortune 1000 space as well as medium-sized companies. Prior to TrustedSec, David was a Chief Security ... [Published SecurityTube.Net - 6 hours ago]
First reported 18 hours ago - Updated 18 hours ago - 1 reports

$2 billion to be spent on information security in Australia in 2014

Worldwide spending on information security will reach $71.1 billion in 2014, an increase of 7.9 percent over 2013, with the data loss prevention segment recording the fastest growth at 18.9 percent, according to the latest forecast from Gartner, Inc. ... [Published Rust Report - 18 hours ago]
First reported Aug 30 2014 - Updated Aug 30 2014 - 1 reports

Nine ways to improve data security

Many businesses continue to underestimate cyberthreats. An urgent change of mindset is called for, says Florian Stahl, lead information security consultant at MSG Systems in Germany. He offers nine tips to bolster thinking around data security.Don’t underestimate ... [Published Journal of Accountancy - Aug 30 2014]
First reported Aug 30 2014 - Updated Aug 30 2014 - 1 reports

Head of Azerbaijani Presidential Administration chairs meeting to discuss the country`s information security

Baku, August 29 (AzerTAc). Azerbaijan`s information security has today been discussed at a meeting chaired by chief of the Presidential Administration Ramiz Mehdiyev, which involved heads of the government information bodies and the country`s media l ... [Published Organization of Asia-Pacific News Agencies - Aug 30 2014]
First reported Aug 30 2014 - Updated Aug 30 2014 - 1 reports

Study finds networking, information security on leading edge of IT

There is a fair-to-decent chance that most of us don’t still have the same job title that we did in 1999, whether that title was sales manager or burger flipper. Especially in the realm of IT — where advances in technology open up new areas of specialization ... [Published Certification Magazine - Aug 30 2014]
First reported Aug 30 2014 - Updated Aug 30 2014 - 2 reports

Cyber Security Summit 2014 Announces Keynote Speakers

Business leaders, policymakers, and researchers will join together at Cyber Security Summit 2014 to learn about the latest cyber security issues, identify new threats, and collaborate on countermeasures and action-based solutions.Minneapolis, Minn. (PRWEB) ... [Published Virtual Strategy Magazine - Aug 30 2014]

Quotes

Customers also presented positive feedback of the App's "driver information security feature, which allows tracking of the location of the designated driver and shows his photo, name, phone number as well as his car's I D number. Customers also appreciated the ability to get lower-cost rides through the Easy Taxi App by not having the extra charge on the meter that is usually added if a taxi cab is requested through a call centre. Eugen Brikcius - General Manager Bahrain & Dammam, commented on the announcement: "The integration between the internet and physical services has been increasing rapidly over the past few years, with many mobile applications having a major impact on established industries and the way they operate. Easy Taxi has been a major driving force behind key and positive changes in the taxi industry, and its introduction to Bahrain comes as part of an ongoing strategy to expand in Gulf and Middle Eastern countries. As of now, we are also in the process of executing plans to introduce the Easy Taxi App to Bahrain's closest neighbour, Dammam SaudiSaudi Arabia. We expect that this will allow visitors from both areas to have a more seamless experience while traveling within those two locations.""
...integration of Tenable's vulnerability, configuration and compliance data into TraceCSO," said Peter Stewart, President and CEO of TraceSecurity. "TraceCSO's ability to correlate valuable Tenable data with compliance, risk and audit data improves the overall effectiveness of any risk and compliance program."
"The financial costs of not acting can be crippling. The average cost of an organisation's worst security breach is rising significantly year on year. For small organisations the worst breaches cost between £65,000 and £115,000 on average and for large organisations between £600,000 and 1.15 million.**" *The Global State of Information Security Survey 2014
...team and the rest of the business represents a gaping hole in the protection of sensitive organizational assets," Bradshaw told the source. "At the root of every single data breach is a human being."

More Content

All (6098) | News (3718) | Reports (5) | Blogs (2289) | Audio/Video (0) | Fact Sheets (64) | Press Releases (22)
sort by: Date | Relevance
Easy Taxi Launches Operations in Bahrain [Published Zawya.com - 16 mins ago]
Data date [Published Professional Security - 23 mins ago]
TraceSecurity announces integration with Tenabl... [Published Individual.com - 53 mins ago]
Cyber Essentials: benchmarking best practice [Published SC Magazine UK - 1 hour ago]
CCS selects suppliers for Managed eMail [Published Tech Market View - 1 hour ago]
JOURNALIST’S TOOLBOX: Beginner’s guide to impro... [Published Philippine Center for Investigative Journalism - 1 hour ago]
Richard Horne, PwC cyber partner, comments on c... [Published Noodls - 2 hours ago]
GLOBALSCAPE : Chief collaboration officers coul... [Published 4 Traders - 2 hours ago]
Alleged Bank Hack Tied to Phishing? [Published Data Breach Today - 3 hours ago]
Satven to evolve as complete engineering soluti... [Published MotorIndia - 3 hours ago]
Movers and makers: September-October [Published Latest articles from SC Magazine UK News - 3 hours ago]
Regulatory Content Management Analyst (Graduate... [Published PharmaDiversity - 3 hours ago]
Business Management Lead Job [Published PharmaDiversity - 3 hours ago]
Middle East Cyber Security Market Global Indust... [Published MyNewsDesk - 4 hours ago]
IT Governance makes new EU data protection and ... [Published Ein News - 4 hours ago]
Business in brief: IT body appoints chief execu... [Published Belfast Telegraph - 4 hours ago]
CouponDunia: Why US-born Sameer Prawani chose t... [Published Economic Times - 4 hours ago]
RVAsec - David Kennedy - 2014 Keynote [Published SecurityTube.Net - 6 hours ago]
PCIDSS recertifies Sterling Bank [Published The Guardian Nigeria - 6 hours ago]
LIC changes take effect [Published FWplus - 6 hours ago]
Actor's private moment with her husband exposed [Published WA Today - 7 hours ago]
Dairy database a step closer [Published Voxy.co.nz - 8 hours ago]
Sterling Bank bags PCIDSS recertification [Published Business Day Nigeria - 9 hours ago]
Eight Financial Technology Startups Enter the F... [Published Good Day Sacramento - 10 hours ago]
Sterling Bank Bags PCIDSS Recertification [Published This Day Online - 10 hours ago]
Internet of Things: Can it Redefine the Future ... [Published Dynamic CIO - 11 hours ago]
Globe Business fortifies commitment to customer... [Published Philippine Star - 11 hours ago]
Online privacy: California passes nation's stif... [Published Contra Costa Times - 12 hours ago]
The Misleading Interpretation of Security Counc... [Published JCPA.org - 17 hours ago]
Medical identity theft: How the health care ind... [Published Fortune - 17 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Movers and makers: September-October [Published Latest articles from SC Magazine UK News - 3 hours ago]
The latest news on the people and companies at the forefront of information security. ...
RVAsec - David Kennedy - 2014 Keynote [Published SecurityTube.Net - 6 hours ago]
David is the Founder and Principal Security Consultant for TrustedSec, who provides information security consulting services for a large portion of the Fortune 1000 space as well as medium-sized companies. Prior to TrustedSec, David was a Chief Security ...
Affordable Online Master’s Degree Programs [Published The Simple Dollar - Aug 29 2014]
This is part of a four-part series that focuses on affordable online education, specifically online colleges and various degree programs. Other articles in this series cover the most affordable online colleges in general, affordable online bachelor’s ...
Despite Upgrades Mining Industry Still Suffers ... [Published HackSurfer Articles - Aug 29 2014]
Many advances have been made in the mining industry by way of information technology but data breaches are being overlooked. Mining Global says, "in 2013 Ernst & Young Global Limited conducted a Global Information Security Survey and found almost 41 ...
Understanding IE’s New Exploit Mitigations: The... [Published Security Intelligence - Aug 29 2014]
In a previous article, I explained use-after-free (UAF) vulnerabilities and why they are a common bug, especially in large and complex codebases such as Internet Explorer (IE). Because of this, a number of targeted attacks were found to be leveraging ...
1 2 3 4 5 6 7 8 9 10 ...

Press Releases

sort by: Date | Relevance
Chief Information Officer Thomas Bayer to Leave... [Published SEC US Press Releases - Aug 20 2014]
QTS to Present with Information Security Partne... [Published Financial Services - Aug 11 2014]
Hexis Cyber Solutions and Infosecurity Magazine... [Published GlobeNewswire: Acquisitions News - Jul 15 2014]
Tagetik Receives ISO 27001 Information Security... [Published Financial Services - Jun 26 2014]
Speech: Karen Bradley Speech on UK Cyber Security [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
1 2 3 4 5
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.