Home Tags Information Security

Tag: Information Security

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).

IT security

Sometimes referred to as computer security, information technology security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.

Information assurance

The act of providing trust of the information, that the Confidentiality, Integrity and Availability (CIA) of the information are not violated. E.g., ensuring that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. A common method of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.

Annual Verizon security report says sloppiness causes most data breaches

Security threats are constantly evolving, but as Verizon's latest DBIR (Data Breach Investigations Report) shows, the more things change in information security, the more they stay the same.More than half (51 percent) of the data breaches analyzed i...

Picture this: Senate staffers’ ID cards have photo of smart chip,...

Senate employees just use passwords, and their badges sport a picture of an alternative.

5 ways the U.S. is educating cybersecurity talent – and what’s...

It’s no secret that the world is facing a shortage of cybersecurity talent.

The (ISC)² Center for Cyber Safety and Education’s 2017 Global Information Security Workforce study projects a deficit of over 1.8 million qualified cybersecurity professionals between now and 2022.To read this article in full or to leave a comment, please click here(Insider Story)

5 ways the U.S. is educating cybersecurity talent—and what’s still missing

It’s no secret that the world is facing a shortage of cybersecurity talent.

The (ISC)² Center for Cyber Safety and Education’s 2017 Global Information Security Workforce study projects a deficit of over 1.8 million qualified cybersecurity professionals between now and 2022.To read this article in full or to leave a comment, please click here(Insider Story)

Researchers claim China trying to hack South Korea missile defense efforts

Deployment of THAAD upsets China, seen as espionage tool.

Cyber Security is a ‘people problem’ says IISP Survey

…but more companies say they are better prepared to deal with a breach or incident 20 April 2017: Over 80% of security professionals identify ‘people’ as the industry’s biggest challenge compared to technology and processes, according to the results of the second annual survey from The Institute of Information Security Professionals (IISP).

The survey also indicates that while 60% of respondents still feel that investment is not keeping pace with threat levels, there was a... Source: RealWire

Tanium exposed hospital’s IT while using its network in sales demos

CEO used client hospital's network in demo "hundreds of times," reports WSJ.

Lawyers, malware, and money: The antivirus market’s nasty fight over Cylance

On the front lines of the antivirus industry's "testing wars."

In slap at Trump, Shadow Brokers release NSA EquationGroup files

"Master" archive contains older hack tools—some decades old.

Misys appoints Natalie Gammon as Chief Information Officer

New CIO will support delivery of Misys Platform-as-a-Service (PaaS) expansionLondon, UK, 5 April 2017 – Misys today announced the appointment of Natalie Gammon as the company’s new CIO. Natalie takes responsibility for managing Misys global infrastructure and technology operations, including all business applications and support services, as well as the company’s data centres and overall information security.
She will drive process efficiencies and deliver continuous technology improvements across the organisation and support the company’s expansion... Source: RealWire

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel’s smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics’ Knox platform later this year.That means that organizations looking for smartphones offering government-grade security will be able to buy the Samsung Galaxy S7 or, soon, the S8 rather than the now-discontinued BlackBerry OS smartphones like the one Merkel uses.[ Android is now ready for real usage in the enterprise. Read InfoWorld's in-depth guide on how to make Android a serious part of your business. | Get the best office suite and the 38 best business-worthy apps for your Android device. ] In addition to encrypting communications and data stored on the device, the new SecuSuite also secures voice calls using the SNS standard set by Germany’s Federal Office for Information Security (BSI). Organizational app traffic is passed through an IPsec VPN, while data from personal apps can go straight to the internet.

Encrypted voice calls go through a different gateway, not the VPN.To read this article in full or to leave a comment, please click here

IT security breaches: Why users shouldn’t take all the blame anymore

Information security professionals need to get beyond 'blaming the user' says expert.