Information Security

Deploying deception for protection: Juniper Networks
Securing web traffic the most significant network security concern for majority of organisations Deception-based approach to enterprise security addresses threats much earlier in attack cycle
Holistic approach to security needed: McAfee
Cyber threats are constantly testing organisational defences and evolving their attacks to find new ways to evade detection. So, unless organisations are maintaining a more dynamic and automated network response to emerging threats, the general state of readiness is less than optimal, says McAfee.
Signatures are passé, you need AI to StopTheHacker
Approximately 2,500 pieces of new web malware released every day; zero-day malware can't be detected by traditional signature-based approaches. Start-up StopTheHacker seeks to address this gap via proprietary technology driven by AI that proactively scans websites for malware.
Cybersecurity Malaysia appointed OIC-CERT secretariat
CyberSecurity Malaysia (CSM), an agency under the Ministry of Science, Technology and Innovation (MOSTI) has been appointed the secretariat to the Organization of the Islamic Conference-Computer Emergency Response Team (OIC-CERT).
Companies unprepared for data privacy risks
Many organizations lack the business behaviors and compliance practices necessary to adequately address growing consumer and regulatory concerns about data security and privacy, according to a new study by communications agency Edelman.
Facebook shuts down Albania Pirate Group
Security firm Sophos has reported that stolen passwords and banking data were being shared on a Facebook page belonging to the Albania Pirate Group, urging users to report any such pages found to Facebook immediately. 
Mathematician unlocks weak domain keys, Google and Microsoft affected
DomainKeys Identified Mail (DKIM) Verifiers have been found to be susceptible to abuse by attackers due to weak encryption, allowing for the spoofing of e-mails from recognized domain names.
'Security research is a serious business'
Security researchers are often perceived as counter-culture driven individuals who are having a ball of time partying and enjoying life to the max but this couldn't be further from the truth, according to applied information security researcher Haroon Meer.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019