CyberDB research about Phishing covers different types of phishing techniques, tools and service offering from vendors, market overview and common anti-phishing challenges organizations face.
To download the free report press here
CyberDB research about Phishing covers different types of phishing techniques, tools and service offering from vendors, market overview and common anti-phishing challenges organizations face.
To download the free report press here
We keep hearing about the widening skills gap ravaging the Cybersecurity industry. Lack of qualified personnel is slowing its growth and affecting the security level of the customers. But most people outside the industry see these statistics and shrug. The cybersecurity industry is perceived as a very small, elitist segment of the tech market. Even to point of it being a niche industry.
In early February 2017, Tallinn Manual 2.0 was published by Cambridge University Press. Led by the NATO Cooperative Cyber Defence Centre of Excellence, publication of the initial Tallinn Manual occurred in 2013 and focused on the applicability of international law to conventional state-authorized and operated cyber warfare. Authored by a group of international law experts, the recent follow-up focuses on a full spectrum of international law as applicable to cyber operations conducted by and directed against nation states, ranging from peacetime legal regimes to the law of armed conflict.
Connected cars are exposed cyber threats. Security vendors are now looking to secure these vehicles in a fast growing sector of the cyber industry- this post is an extract from CyberDB reserach paper regarding this market. To download the complete report, please follow this link
RSAC 2017 is behind us. It has been bigger, noisier and more crowded than any cybersecurity event in history. It’s so big, it’s overwhelming. And if you consider the off-site meetings, mini-conferences, meetups and parties you can forgive an average visitor if he or she feels kind of fuzzy afterward. Vendors don’t have it easy, either. With more than 700 companies and organizations presenting, trying to stand out or simply gauge the competition is extremely difficult.
Former New York Mayor Rudy Giuliani has been tapped to be the President’s new “cyber security czar.” The appointment has been met with trepidation among those in the information security business who point out Mr. Giuliani’s lack of expertise in anything cyber-related, despite being Chair of the Cybersecurity, Privacy and Crisis Management Practice at a Miami-based law firm and advising companies on information security since 2002. In fact, critics cite recent reporting revealing that passwords used by Giuliani and 13 other top staff members have been leaked in mass breaches of websites like LinkedIn, MySpace, and others between 2012 and 2016.
Israel is a major force in cybersecurity innovation and development, and Israeli cybersecurity companies are at the forefront of technology, rubbing shoulders with global industry giants. In fact, according to CyberDB data-bank, Israel has the second largest amount of cybersecurity companies in the world, second only to the US. In terms of actual sales Israel cybersecurity exports account for anything between 5-10% of the global cybersecurity market , an amazing figure given Israel’s miniscule size and small population.
The World economic forum released its annual Global risk report prior to 2017 WEF meeting at Davos, Switzerland. The report highlights the risks emanating from AI, Cyber espionage and Internet of things, and focuses on the rise of cyber dependency due to increasing digital interconnection of people, things and organizations.
in December 2016, Russian President Vladimir Putin approved a new information security doctrine, which updates the older 2000 version. The doctrine, a system of official views on the insurance of the national security of the country in the information sphere, regards the main threats to Russia’s security and national interest from foreign information making its way into the country, and sets priorities for countering them.
The new GDPR (General Data Protection Regulation- see the full document here ) issued by the EU earlier this year raises many questions among compliance and privacy officers. Who is required to comply with the GDPR and are companies really expected to revamp the entire way they handle customer privacy?