Skip to main content


Showing posts with the label cyber crime

Businesses Expect Advanced Security to Lessen Reliance on Human Judgement in Fighting Global Cyber Battle

Latest research from Trend Micro reveals that three quarters of businesses (76 percent) foresee advanced security techniques will lessen the need to rely on human judgement to capture subtle differences between threat anomalies in the future. This displacement will reduce the strain on IT resources leaving time for other strategic activities. Nearly 45 percent expecting this change to occur within the next five years.
The research, which is the second phase of Trend Micro’s investigation into the state of cybersecurity, surveyed 2,402 IT decision makers across Europe and the US. It reveals that transformation is potentially already under way with two-thirds of organizations (67 percent) currently using advanced techniques within their cybersecurity solutions, and a further 43 percent of those who currently do not, planning to introduce them in the next 12-18 months.
Despite the majority of businesses advocating advanced security techniques, there is still skepticism and confusion. Lo…

Combating Cyber Crime in 2017 by Building an Information Security Programme

By: Cherif Sleiman, Vice President, Europe, Middle East and Africa at Infoblox 
It Often Starts With Anarchy 
As far as we’ve come with information security, the landscape still feels like the wild west. Every day we read about the cyber equivalent of ungoverned towns terrorized by enterprising criminals who pillage as they wish with seemingly no consequences. The good guys are few, and the sheriffs are too far between. Maintaining the peace rests upon you; whether you asked for the job or not. Swiftly reacting to intrusive foes may grant you the right to fight another day, but getting ahead of security risks warrants a proactive, strategic plan with structured management oversight.

Report: Cybercrime gets easier, attribution gets harder

Websensereleased theWebsense Security Labs 2015 Threat Report,analyzing evolving attack trends, tactics and defense vulnerabilities.
The report looks at how threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise. Redirect chains, code recycling and a host of other techniques are allowing these actors to remain anonymous, making attribution time consuming, difficult and ultimately unreliable. Widespread use of older standards in lieu of newer and more secure options continues to leave systems vulnerable and exposed. A brittle infrastructure allows threats to expand into the network framework itself, including the code base of Bash, OpenSSL, and SSLv3.

India to create a taskforce of 5,00,000 cyber security professionals

India ranks 3rd    in terms of the highest number of internet users in the world after USA and China, the number is projected to grow 6-fold between 2012-2017 with a compound annual growth rate of 44%. India also secures a spot  amongst the top 10 spam-sending countries in the world alongside USA
·India has a huge shortage of cyber security specialists, the number of trained manpower only accounts to 556 compared to 1.25 Lakh in China and 91,080 in USA