The security challenges of managing complex cloud environments

Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios, a Cloud Security Alliance and AlgoSec study reveals. The survey of 700 IT and security professionals aims to analyze and better understand the state of adoption and security in current hybrid cloud and multi-cloud security environments, including…

US Delays Huawei Ban for 90 Days

A Commerce Department filing said the delay does not change the ban imposed by President Donald Trump on national security grounds, an action with major implications for US and Chinese technology firms. Instead, it grants a temporary license that will allow Huawei to continue doing business with American firms. “The Temporary General License grants operators…

Think Data Security, Not Endpoint Security

INTEROP 2019 – LAS VEGAS – Endpoint security is a common concern among organizations, but security teams should be thinking more broadly about protecting data wherever it resides. “If you’re just focusing on device protection and not data protection, you’re missing a lot,” said Shawn Anderson, executive security advisor for Microsoft’s Cybersecurity Solutions Group, at…

Dutch Probe China’s Huawei for Possible Spying: Report

The probe, reported by De Volkskrant newspaper, comes as a series of western countries weigh the risks of allowing the Chinese telecoms giant to become involved in the new 5G mobile phone infrastructure. Volkskrant said the AIVD refused to confirm the report. AIVD spokesman Hilbert Bredemeijer declined to comment, saying the spy agency “does not…

The largest breaches over the past three years have caused massive and irreparable damage

Publicly traded companies suffering the worst data breaches averaged a 7.5 percent decrease in stock price, a Bitglass report reveals. Bitglass researched the three largest data breaches of publicly traded companies from each of the last three years in order to uncover cybersecurity trends and demonstrate the extensive damage that can be done by improper…

GDPR Drives Changes, but Privacy by Design Proves Elusive

In the year since it went into effect, the European Union’s General Data Protection Regulation (GDPR) has heightened awareness of data privacy issues and driven some important changes in how US companies handle consumer data. However, most organizations appear to be a long way off from implementing GDPR’s core requirement for a privacy-by-design model for…

The six biggest cybersecurity risks facing the utilities industry

The utilities industry is rapidly modernizing its infrastructure, adding more digitized equipment and connectivity across devices, plants, and systems. This evolution to “smart infrastructure” represents a positive, paradigm shift for the industry. Unfortunately, the security policies of many utilities have not evolved along with it, leaving them incredibly vulnerable. Utilities are investing heavily to modernize…

Cybersecurity skills shortage still the root cause of rising security incidents

The cybersecurity skills shortage is worsening for the third year in a row and has impacted nearly three quarters (74 percent) of organizations, as revealed in the third annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and independent industry analyst firm Enterprise Strategy Group (ESG). Security incidents with serious ramifications…