2014 Global Report on the Cost of Cyber Crime – a HP Ponemon Study.

The results of the HP Enterprise Security sponsored Ponemon 2014 Global Report on the Cost of Cyber Crime are summarised below. During the period they conducted interviews and analysed the findings, mega cybercrimes took place. Most notable was the Target cyber breach, which was reported to result in the theft of 40 million payment cards. […]

Rate this:

, , , , ,

Leave a comment

95% of enterprises allow BYOD

Courtesy of Symantec.

Rate this:

, , ,

1 Comment

Private Cloud Security Keeps IT Up At Night

Rate this:

, , ,

Leave a comment

85% of mobile apps fail to provide basic privacy information

A survey of over 1,200 mobile apps by 26 privacy regulators from across the world has shown that a high number of apps are accessing large amounts of personal information without adequately explaining how people’s information is being used. The survey by the Global Privacy Enforcement Network (GPEN) examined the privacy information provided by 1,211 […]

Rate this:

, ,

1 Comment

Mobile Malware up 68% in 6 months

Rate this:

, ,

Leave a comment

VMware guides that will help you with your complaince efforts

Coalfire Systems, Inc. have launched an impressive range of VMware compliance guides. FedRAMP guides VMware FedRAMP Product Applicability Guide VMware FedRAMP Architecture Design Guide VMware VCE FedRAMP Product Applicability Guide Addendum VMware Hytrust FedRAMP Product Applicability Guide Addendum VMware McAfee FedRAMP Product Applicability Guide Addendum VMware PCI DSS version 3.0 guides VMware PCI 3.0 Product Applicability Guide […]

Rate this:

Leave a comment

What to do in the case of a cyber security related emergency

In the event you have a cyber security related emergency, there are some simple, immediate steps you can take to help get the situation under control and preserve evidence for investigation.  Most incidents can be classified as a malware compromise, a data compromise, or computer misuse.  Each of these types of incidents require immediate action […]

Rate this:

, , ,

Leave a comment

Follow

Get every new post delivered to your Inbox.

Join 1,496 other followers