Cisco today unveiled a host of new capabilities and services that give security professionals extensive intelligence and analysis on potential compromises and solutions to protect against, respond to and recover from attacks.


Cisco today unveiled a host of new capabilities and services that give security professionals extensive intelligence and analysis on potential compromises and solutions to protect against, respond to and recover from attacks.
The security company intends to leverage the event to educate regional businesses and CXOs on its patented Layer 8 technology and shall showcase how IT and security teams in the region can benefit from Cyberoam’s network security innovations.

Philippe Roggeband, Business Development Manager, Cisco Security Architecture, discusses the need for thorough security measures when it comes to the Internet of Things.

In the next few years, businesses may live or die by IoT. Handle it well and your company thrives. Mess …

An otherwise unremarkable hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet, according to FireEye.

Palo Alto Networks has revealed details of a widespread vulnerability in Google’s Android mobile operating system that allows attackers to hijack the installation of a seemingly safe application – Android Package File (APK) – on user devices, replacing it with an app of the attacker’s choice.

Many recent studies of security vulnerabilities come to the same conclusion: The human factor is a greater risk to organisations than flaws in technology.

State sponsored malware is becoming increasingly sophisticated according to a report released by security vendor, Kaspersky Labs. According to a company statement, this new trend was confirmed during analysis of the EquationDrug cyber-espionage platform, the main espionage platform developed by the Equation Group.

There is no question that the use of mobile devices, both personally and professionally, are now not only convinient, but necessary for productivity. As the mobile technology develops, mobile security best practices must also adapt.

Researchers sponsored by the U.S. government have reportedly tried to defeat the encryption and security of Apple devices for years.

Cyber-terrorism attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of Kaspersky Lab.
Bit9 + Carbon Black has announced a partnership with Microsoft to integrate some of the company’s endpoint solutions.

A cyber-espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.

A cybercriminal gang has stolen up to $1 billion from banks in at least 25 countries over the last two years, infiltrating networks with malware and spying on employees’ computers to facilitate large wire transfers, Kaspersky Lab has revealed.
Managed security services provider Paladion Networks has announced today the opening of its new Global Security Operations Centre (GSOC).

Syrian opposition leaders lost gigabytes of secret communications and battlefield plans to hackers who baited them into downloading malware during flirtatious Skype chats, according to a report released Sunday.
As per the terms of the agreement, the smartphone manufacturer will preload Trend Micro’s Dr. Safety app on the latest Asus ZenFone 2 smartphones to help protect users from account fraud, privacy risks, phishing, lost devices, and unwanted contact, plus a feature that recommends safe mobile games for users.

The U.S. National Security Agency has had a secret foothold for years in North Korea’s networks and saw signs of the Sony Pictures Entertainment attack but only in retrospect grasped its reach and depth, The New York Times has reported.

2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.

IT security ‘fire drills’ should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a breach, says Neil Campbell Group General Manager, Security Business Unit, Dimension Data.