Archive | Sponsor

Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Wandera has uncovered a number of severe mobile data exposures that affect a high proportion of enterprises. Try it now for free. SPONSOR

Wandera has uncovered severe mobile data exposures that affect a high proportion of enterprises. Try it now for free

Many thanks to the great folks at Wandera, who have sponsored my writing for the last week.

Wandera's 2017 Mobile Leak Report found more than 200 mobile websites and apps leaking personally identifiable information across a range of categories – including those that are essential for work. Your employees might have been exposed to credit card theft, identity theft, or even the re-use of login credentials to access a corporate network.

Read the 2017 Mobile Leak Report to see which types of apps present the highest risk to your sensitive corporate data.

Mobile is indisputably the new frontier for cyber threats, as adoption of corporate mobility continues to grow, so too does the number of attacks. Businesses have become increasingly exposed to new threats, vulnerabilities and data leaks.

Wandera provides enterprise-grade threat defense against these mobile security risks, keeping devices secure across all four levels of protection as identified by Gartner. Try Wandera for free to assess and understand what is happening with your mobile data.

Wandera works with some of the biggest and best-loved brands in the world. Find out how your business could also benefit by having devices protected and managed at the data-level.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Free VASCO white paper: PSD2 - Which strong authentication and transaction monitoring solutions comply? SPONSOR

Free VASCO white paper: PSD2 - Which strong authentication and transaction monitoring solutions comply?

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

In this VASCO white paper on PSD2, the revised directive on payment services, you will discover:

  • The proposal for draft Regulatory Technical Standards (RTS) for strong customer authentication (SCA) which have been published in August 2016 by the European Banking Authority (EBA).
  • Background information about the draft RTS.
  • Common authentication solutions that are used by many online banking and mobile banking applications today.
  • The actual requirements from the draft RTS.
  • To which extend current authentication solutions meet the requirements in the draft RTS.

Interested in learning more? Download VASCO's white paper: PSD2 - Which strong authentication and transaction monitoring solutions comply?


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Download VASCO's white paper and discover why RASP technology is critical for modern app security SPONSOR

VASCO white paper: Why RASP technology is critical for modern app security

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

In a new white paper VASCO explains how RASP - Runtime Application Self-Protection - makes your business applications more secure and reliable, while managing the increased risks of rising mobile app use amidst increasingly sophisticated malware.

RASP strengthens mobile app security - effectively neutralizing potential threats, and proactively securing businesses in ways that other security tools can’t easily deliver.

In the white paper you'll learn more about integrated application security solutions, including:

  • How RASP bridges the divide between infrastructure and app server owners
  • Which intrusions RASP can detect and prevent
  • How natively integrated RASP technology strengthens mobile apps
  • Why applications secured with RASP result in a lower cost, higher benefit ratio

Interested in learning more? Download VASCO's white paper: RASP Technology is Critical for Modern App Security.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
VASCO white paper- Strong authentication to solve your everyday banking problems SPONSOR

VASCO white paper- Strong authentication to solve your everyday banking problems

Many thanks to the great folks at VASCO Data Security, who have sponsored my writing for the last week.

Experts argue that e-banking authentication has become so stagnant since the 2005 Guidance that it is no longer considered "cool" or innovative. Tokens, key fobs, mobile tokens, SMS codes, phone calls certainly did their job confirming a customer’s identity and combating cyber-attacks for many years. What has changed since 2005?

We want you to pause for a moment and take a fresh look at how strong authentication can serve banks in areas you never thought of using it for. Can strong authentication help achieve a much needed convenience, security, and cost savings beyond online banking login?

Discover nine innovative use cases from VASCO that will help you visualize how application security, multi-factor authentication, and fraud prevention solutions can play out to create a secure and frictionless user experience.

Download this executive summary by American Banker and VASCO to learn more about:

  • Authentication across all channels
  • Convenient retail mobile banking
  • Cardless ATM
  • Bank card PIN issuance and mailers
  • Call center and IVR authentication
  • ACH batch payments
  • Functionality vs security in commercial mobile banking app
  • Cross-channel authentication for commercial banking
  • Branch employee and device authentication

Interested in learning more? Download VASCO's white paper on how to Innovate with Strong Authentication to Solve your Everyday Banking Problems.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Lab test reveals 10x productivity gain from real-time threat intelligence for SIEMs SPONSOR

Lab test reveals 10x productivity gain from real-time threat intelligence for SIEMs

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Make sure to download your free copy of the industry's first lab test measuring productivity gains from threat intelligence.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

Operational defenders want threat intelligence to add tangible and quantifiable value to their organization's security. As a provider of real-time threat intelligence, Recorded Future strives to deliver measurable benefits to its customers, who have reported back some impressive results.

Inspired by this feedback, Recorded Future commissioned an independent lab test to measure the quantifiable value - in terms of productivity and security - that a SOC (security operations center) analyst gains from integrating Recorded Future with a SIEM (security information and event management) solution.

The results showed that one SOC analyst, in a controlled environment, experienced a 10x gain in productivity after Recorded Future real-time threat intelligence was integrated with a SIEM.

To review the full independent lab test, download the report.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinar SPONSOR

Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

VASCO, a global leader in authentication, electronic signatures, and identity management, is sharing its expertise in a free on-demand webinar entitled "Top 10 tips for a successful and secure mobile first strategy."

Mobile banking has definitely shifted focus from transaction to customer interaction, enabling users to engage with their bank anytime, anywhere and more frequently.

But how can you establish a successful and secure mobile first strategy, while keeping an eye on user convenience?

Check out this FREE on-demand webinar now!

Discover the necessary tips to establish a successful and secure mobile first strategy:

  • Enable more services on mobile
  • Make user experience fast, convenient and secure
  • Score your user's device and context
  • Combat malware and other attacks
  • Adopt mobile as the key to all your banking channels
  • and many more...

If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Lab test reveals 10x productivity gain from real-time threat intelligence for SIEMs SPONSOR

Lab test reveals 10x productivity gain from real-time threat intelligence for SIEMs

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Make sure to download your free copy of the industry's first lab test measuring productivity gains from threat intelligence.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

Operational defenders want threat intelligence to add tangible and quantifiable value to their organization's security. As a provider of real-time threat intelligence, Recorded Future strives to deliver measurable benefits to its customers, who have reported back some impressive results.

Inspired by this feedback, Recorded Future commissioned an independent lab test to measure the quantifiable value - in terms of productivity and security - that a SOC (security operations center) analyst gains from integrating Recorded Future with a SIEM (security information and event management) solution.

The results showed that one SOC analyst, in a controlled environment, experienced a 10x gain in productivity after Recorded Future real-time threat intelligence was integrated with a SIEM.

To review the full independent lab test, download the report.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Fight cybercrime by "plug and play" encrypting all data and communications SPONSOR

Fight cybercrime by 'plug and play' encrypting all data and communications

Many thanks to the great folks at Corporate Encryption GmbH, who have sponsored my writing for the last week.


We encrypt email, chat, data, calling, calendars etc. – also on smartphones and mobile devices.

TEP is the World's first turnkey enterprise encryption solution, enabling business to communicate and collaborate securely - while still being efficient and flexible. The platform is web-based and also comes with apps.

Tep dashboard

TEP also helps enterprises get ready for the relative high standards introduced by EU’s new data protection law - General Data Protection Regulation (GDPR).

The platform solves a major "headache" in one go. TEP's end-to-end encryption ensures only the sender and intended recipients are able to decode the communications and data. All data is protected, both while in transit and at rest. In short, it’s all about who has the access to the encryption keys.

Communications and data are protected by strong AES 256-bit end-to-end encryption and RSA 2048-bit key cryptography. Combined with our proprietary platform integration, this is the most secure and easy-to-use platform offered to the enterprise market. Your communications and data are extremely secure and protected. They deserve it.

Enterprises can choose between a hosted - or an on premise solution, depending on data storage needs and requirements.

TEP is developed by Corporate Encryption GmbH, a cyber-security company, specialized in secure encrypted communications. We are a strong International team of security, cyber-forensic and encryption specialists, with offices in Switzerland and Denmark.

Click here to learn more, register for a free demo, and start protecting your enterprise and clients against cybercrime.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinar SPONSOR

Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinar

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

VASCO, a global leader in authentication, electronic signatures, and identity management, is sharing its expertise in a free webinar entitled "Top 10 tips for a successful and secure mobile first strategy."

Mobile banking has definitely shifted focus from transaction to customer interaction, enabling users to engage with their bank anytime, anywhere and more frequently.

But how can you establish a successful and secure mobile first strategy, while keeping an eye on user convenience?

Register today for this FREE 30-min webinar!

Discover the necessary tips to establish a successful and secure mobile first strategy:

  • Enable more services on mobile
  • Make user experience fast, convenient and secure
  • Score your user’s device and context
  • Combat malware and other attacks
  • Adopt mobile as the key to all your banking channels
  • and many more...

If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last few weeks.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
VASCO explains how to secure data access within the Healthcare industry SPONSOR

VASCO explains how to secure data access within the Healthcare industry

Many thanks to the great folks at VASCO Data Security, who have sponsored my writing for the last week.

VASCO, a global leader in authentication, electronic signatures, and identity management, is sharing its expertise in a new free white paper: "Securing Data Access Within the Healthcare Industry".

The integration of technology within the healthcare sector continues to create seismic changes in how individuals receive medical care. Yet in their rush to adopt technology designed to improve the consumer’s experience, organizations within the healthcare industry face the very real threat of sensitive patient data ending up in the hands of cybercriminals.

When it comes to the value of stolen data within the criminal underground, the more personal the better – and it does not come any more personal than protected health information (PHI) included in medical records. In the hands of criminals, PHI facilitates all types of crimes including prescription fraud, identity theft and the provision of medical care to a third party in the victim’s name.

Despite its compromised state, there is more value attached to healthcare-related data than other types of personally identifiable information. A stolen credit card, for example, has a finite life because once the customer discovers fraud they cancel the card. PHI, on the other hand, contains government-issued identity numbers such as national insurance numbers, as well as medical and prescription-related data that are permanent.

Security cannot remain an afterthought. Breaches negatively impact the patient and the broader healthcare ecosystem.

Download VASCO's free white paper now, and learn how to secure data access within the Healthcare industry!


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...