Another busy week in the channel with movement across all tiers as vendors distributors and resellers bring on some fresh talent to help drive growth.
Matt Gangwer, CTO of Rook Security and Ryan O'Leary, VP of Threat Research Center and Tech Support at WhiteHat Security join CSO Online's Steve Ragan to talk about the evolution of ransomware, and what companies need to do to combat it.
WhiteHat Security has announced the appointment of Derek James as Regional Director for UK & Ireland. With more than 30 years of experience in senior leadership, sales and business development roles, he will be responsible for WhiteHat’s business development strategy in the two territories.
Application security vendor WhiteHat Security has appointed Derek James as its regional director for UK & Ireland. James he will be responsible for WhiteHat’s business development strategy in the two territories.
Of the 62 new crypto ransomware families that emerged, 47 can be attributed to Russian-speaking actors says Kaspersky - but does the source of the attack matter?
More than 42,000 attendees came through the doors here at RSA, one of the nation's largest computer security conferences. But one group didn't join them — officials from the Trump administration.
In the ongoing quest for effective ways to deliver great software, the age-old debate of people versus technology rages on.
The UK’s Supreme Court has been forced to warn netizens of a phishing campaign using the institution’s seal and logo to trick unsuspecting recipients.
Ryan O’Leary, pictured, VP Threat Research Centre at web security product company WhiteHat Security, discusses why running a bug bounty programme has become an increasingly popular method of improving their security posture.
Data management, machine learning, and cloud cost models will be top-of-mind for organizations this year. Tech leaders sound off on the other top technology trends that we will see in 2017.
The Commons Public Accounts Committee has released a report that heavily criticises the government’s approach to cyber security. It labeled the current cyber-security strategy as “inconsistent and chaotic” and said that the government has taken too long to “coordinate the ‘alphabet soup’ of agencies” protecting Britain in cyberspace.
From artificial intelligence, to predictive analytics, to ransomware security, to the changing role of the chief data officer, tech leaders sound off on the top technology trends that we will see in 2017.
Most of us are familiar with the film, or at least the phrase, Groundhog Day – made popular by the cult film starring Bill Murray.
Data Privacy Day 2017 is here, and we're reminded once again of the need to raise awareness and promote privacy and data protection best practices.
2016 saw a record number of data breaches and this demonstrates that organisations, both large and small, still have a lot to learn when it comes to data privacy.
Data privacy and protection is a compelling issue. Just last week, WhatsApp came under fire over a supposed ‘backdoor’ that could potentially be used to siphon supposedly confidential communications.
Privacy settings on our favorite apps aren’t always intuitive. In fact, they can be downright head-scratching to users who trust that their apps are keeping their private information under wraps.
Once the preserve of Bitcoin, blockchain is starting to show its enterprise potential.
It's a fair question in light of attempts by authorities investigating the slaying of an Arkansas man to obtain voice recordings collected by an Amazon Echo speaker and its Alexa digital assistant.
Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.
Security pros share New Year’s resolutions.
Despite all the bad news in information security in 2016, some positive developments may finally shift momentum.
Hacktivism has been a fact of life even before the rise of Anonymous. In 2016, we saw a tidal wave of global hacktivism and cyber spying, and this trend will continue in 2017. The social unrest around the world is ripe for escalating hacktivism, and it is increasingly fueled by goals of propaganda and profit rather than altruism.
Google has released project Wycheproof, which aims to make checking for vulnerabilities easier by checking cryptographic libraries for known weaknesses.
While employees are away, the security staff should get policies in order.
Ryan O’Leary, VP Threat Research Centre at WhiteHat Security, discusses why developers and security practitioners must join forces on application security.
Black Friday, the annual American-inherited discount day, has come around once again. Busting in with its cut-price retail goods and heightened tizzy of consumers looking for the best deals, so does the risk of fraud, cyber-attacks and cyber-crime shoot up like a 4th of July firework.
A perfect example of the "domino effect" that data breaches can have.
One of Britain’s biggest mobile phone companies, Three, has admitted to a major cyber-security breach which could have exposed six million customers’ personal data at risk. Three Mobile admitted that hackers have successfully accessed its customer upgrade database after using an employee login.
Three men arrested in connection with mobile handset upgrade fraud enabled by unauthorised access to customer data.
Three people have been arrested due to alleged involvement in a hack attack on mobile toperator Three, which saw them steal data relating to customers due for a phone upgrade.
Gareth O’Sullivan, EMEA Director of Solutions Architecture at WhiteHat Security discusses how bug bounty incentives can be used to effectively complement a business’s existing security strategy.