Home Blog Page 375
In an interesting revelation, David Irvine, chairman of Australia’s Cyber Security Research Centre (CSRC), revealed that the country's competence to thwart cyber-breaches is ‘relatively weak and uncoordinated’. His comments were part of a submission to a parliamentary enquiry, on...
Another in the series of text related cyber-breaches has hit Apple. The ChaiOS bug hasn't found any solution yet. Being shared in the form of a link this freezes the receiver's phone and causes a frenzy in your messages...
Phone maker, Blackberry Ltd. has developed a cybersecurity software, Jarvis, for self-driving cars. Sharing the same name as the A.I. developed by Marvel’s Tony Stark, also the Iron Man, Blackberry’s Jarvis is also an advanced security software for the...
BUSINESS WIRE McAfee, cybersecurity firm,   today announced that Gartner, Inc. has named the company a Leader in the “Gartner Magic Quadrant for Intrusion Detection and Prevention Systems” (IDPS) for the 11th time.1 The McAfee® Network Security Platform (NSP) is a complete network threat and...
A malware developed using the Kotlin programming language is the new cause of concern for Google Play Store. It was recently found that Kotlin can be used to develop nasty apps, which will be difficult to detect. Trend Micro,...
Singapore based LALA World collaborated with cryptographic technology leader, VIBE Cybersecurity International LLC to create a fully secured financial-exchange platform. LALA World, which primarily focuses on migrants and unbanked population, caters to individuals, small businesses and micro-entrepreneurs. In wake...
The recent encounters with Spectre and Meltdown techniques, owing to faults in its microprocessors has shaken the world’s largest chipmaker, Intel. With little options but to introduce safety measures to preserve its brand reputation, a new internal security group...
In view of the increasing cybersecurity attacks on small businesses, the Australian Small Business and Family Enterprise Ombudsman has launched a cybersecurity guide, to aid small businesses in intercepting and blocking cyber-breaches. Most of these businesses are ignorant of...
cybersecurity professionals

Changing Role of the CISO

0
By Grant Bourzikas, CISO, McAfee With the growth of digital world, we have seen growth in cyberthreats. These range from the annoying to the downright catastrophic. And as these threats evolve and permutate, we have also seen the evolution of a...
They did it in the past and they are doing it again. There’s a good possibility of North Korea burrowing through accounts and scooping away cryptocurrencies. The monster has matured, it is not into data theft anymore, it is...