Home security and remote monitoring systems are a major application of the Internet of Things (IoT). Most include sensors, motion detectors, video cameras, and recorders all connected via the cloud to a mobile device or the web. But are they and IoT applications in general secure from hackers? This research study...
There is no question that mobile computing is growing at an exponential rate. It's been a remarkable and rapid transformation that much like the advent of the web has left security concerns outpaced by the ease of use and flexibility of a new tool. When vulnerabilities are exploited, the security of mission-critical...
Open source software is a game-changer in helping development organizations herd their application security risks. But it can also introduce risk when employed without adequate precautions. Recent evidence suggests that the presence of application vulnerabilities in open source software is a far more pervasive...
The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers...
Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. These vulnerabilities are the gateway that malicious actors use to circumvent security protections and steal or alter data, deny access, and compromise critical business processes. The processes that...
The demand for improved governance and risk management is huge in Dubai and neighbouring regions, as global players embark on ambitious projects. Smartworld's Ahmad Qurram Baig discusses the CISO's responsibilities.
Oman is dealing with the challenge of increasing cyber incidents and a rise in cybercrime and so on. How does Oman's CERT address this surge? OCERT's head, Al Salehi, shares his 2015 cybersecurity agenda.
Is there a governance structure that can protect your network and customer data against future attacks? Oman Insurance's Bhatia discusses how security and business alignment is critical to data security.
The increasing use of cloud services and Big Data projects is causing major security concerns. This version of the Insider Threat Report focuses on the increasing use of all forms of cloud technology, and provides information about the security and data protection issues that need to be addressed. Increased risk,...
97% of Financial Services respondents report being somewhat or more vulnerable to insider threats. This Research Brief highlights the results collected online by Harris Poll from 102 IT decision makers in U.S. financial services enterprises in the Fall of 2014. U.S. results are compared, where applicable, to findings...
Healthcare data (Personal Health Information [PHI] and other personal data held by healthcare organizations) has become one of the most desirable commodities for sale on "black" Internet sites, and for good reason. Healthcare records typically contain enough detail to not only apply for credit cards or loans, but can...
In the past, insider threats resulted mainly from employees with access to financial data or other secret and sensitive information. That's no longer the case today. Today, employees with legitimate access, service providers or contractors that maintain infrastructure and privileged users are all possible actors, and...
In the past few years, Vormetric has been busy showing the world that it's no longer just your father's file and database encryption vendor. Since the launch of its Vormetric Data Security platform strategy in early 2014, the company has been hard at work extending the platform's capabilities with new features and...
In the wake of a breach, most organizations struggle with a number of concerns related to response, mitigation and notification. While immediate and full disclosure of a breach, in theory, sounds like the most practical advice, it's not always the best move for every organization. The nature of the breach, whether the...
Gulf Air in the Middle East has become one of the region's early adopters of the cloud. What are the challenges for security team to secure data in the cloud? Gulf Air's Jassim Haji shares insight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.