SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
FYI, this is an ex-employee of TechDay.

Stories by Sara - Page 144

Story image
Australia’s breach disclosure policy has major holes, expert says
Wed, 18th Oct 2017
#
breach prevention
#
data privacy
#
cybersecurity
Australia’s breach disclosure policy doesn’t go nearly far enough in protecting consumers and pales in comparison to the European Union’s GDPR.
Story image
Half of IT executives want to detect in-progress attacks before it's too late
Tue, 17th Oct 2017
#
advanced persistent threat protection
#
threat intelligence
#
cyber threats
Nearly half of IT executives seek real-time threat detection, reveals an RSA study, pointing to automation as a key tool to speed up response times.
Story image
Chinese 'Bronze Butler' group suspected of stealing IP from Japan
Tue, 17th Oct 2017
#
firewalls
#
network infrastructure
#
network security
Chinese cyber spies, Bronze Butler, steal Japanese IP in a prolonged espionage campaign targeting technology sectors.
Story image
Top tips for making your mobile device investment go the distance
Tue, 17th Oct 2017
#
mobility
#
xplore technologies
Mobile computing solutions should last at least five years. Well-designed rugged devices can last between seven and nine years.
Story image
DoubleLocker ransomware encrypts Android files and changes your PIN
Mon, 16th Oct 2017
#
smartphones
#
malware
#
ransomware
New Android ransomware DoubleLocker hijacks PINs and encrypts data, posing serious threats to mobile security.
Story image
Locky ransomware is back as one of September's 'most wanted' malware
Mon, 16th Oct 2017
#
malware
#
ransomware
#
cybersecurity
Locky ransomware rises by 11.5% in September, becoming one of 'September's Most Wanted' malware, driven by the Necurs botnet.
Story image
Asia's safest and most dangerous cities for digital security
Mon, 16th Oct 2017
#
smart cities
#
digital signage
#
displays & projectors
NEC says there is evidence that some cities are taking threats seriously, particularly in Asia. Which are the top five safest & most unsafe cities?.
Story image
Defence-in-depth: Hardening every component on the network
Mon, 16th Oct 2017
#
firewalls
#
network infrastructure
#
network security
The Equifax breach exposed 143 million customers' data, highlighting cyber security’s critical role. Defence-in-depth now prioritises every network component.
Story image
ACSC Threat Report highlights real-world effects of cyber attacks
Mon, 16th Oct 2017
#
malware
#
ddos
#
phishing
he organisation says that amongst all the usual security culprits, Distributed Denial of Service (DDoS) attacks have set new records.
Story image
Ransomware market skyrockets 2500% in one year: It’s now worth $6m
Mon, 16th Oct 2017
#
malware
#
ransomware
#
cybersecurity
The ransomware scourge looks set to continue until at least the end of the year, topping what is being called the ‘most notorious year on record’.
Story image
The Coinhive cryptocurrency miner - more trouble than it's worth?
Mon, 16th Oct 2017
#
cryptocurrency
#
blockchain
#
cybersecurity
Are cryptocurrency miners causing more harm than good? Trustwave's SpiderLabs blocks Coinhive miner, claiming end users are left with no benefits.
Story image
CyberArk & Puppet take 'secret protection' to DevOps workflows
Mon, 16th Oct 2017
#
devops
#
apm
#
cybersecurity
CyberArk and Puppet are now Advanced Technology Partners and will strive to embed security modules into DevOps workflows.
Story image
GitHub to boost security tracking for developers' projects
Fri, 13th Oct 2017
#
martech
#
apm
#
open source
GitHub has unveiled security improvements that will allow developers to track which dependencies are associated with public security vulnerabilities.
Story image
Three ways businesses and employees can stay smart online
Fri, 13th Oct 2017
#
firewalls
#
network infrastructure
#
network security
It takes just one unwary employee to share their password or plug in an unauthorised device to put a company at risk.
Story image
North Korean criminals behind phishing attack on US power companies
Thu, 12th Oct 2017
#
phishing
#
email security
#
breach prevention
The North Korean Government is suspected of being behind a spear phishing campaign that targeted US power companies, says FireEye.
Story image
NT Govt & Charles Darwin Uni to fund Associate Professorship in Cyber Security
Thu, 12th Oct 2017
#
edutech
#
cybersecurity
#
government
The Northern Territory Labor Government and Charles Darwin University will jointly invest $700,000 in a new cyber security Professorship.
Story image
You're invited: the 2017 iSANZ Awards & Gala Evening
Thu, 12th Oct 2017
#
awards
#
isanz
#
information protection
Join New Zealand's InfoSec community at an exclusive Gala Dinner as part of the 2017 iSANZ Awards, to be held in Wellington next month.
Story image
Singapore ICA impersonated in web & phone scams
Wed, 11th Oct 2017
#
phishing
#
email security
#
cybersecurity
Singapore Government warns of phone scams and phishing websites targeting Immigration and Checkpoints Authority (ICA).
Story image
Secured Signing and LawHawk take secure document signing to NZ law industry
Wed, 11th Oct 2017
#
secured signing
#
esignature
#
lawhawk
New Zealand tech firms LawHawk and Secured Signing have partnered to create an integrated solution for secure document signatures in the legal industry.
Story image
Symantec urges customers to replace SSL/TLS certificates before deadline
Wed, 11th Oct 2017
#
cybersecurity
#
symantec
#
certification
Symantec has been preparing its PKI and certificate-signing business for the handover to DigiCert in December.