TAG: cyber

  • CDM-award-badge

    IKANOW Chosen as the Leader in Enterprise Security Solutions in the 2016 Cyber Defense Magazine InfoSec Awards

    RESTON, VA – February 29, 2016 – IKANOW, the leader in open-source information security analytics, announced today that Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2016, has named IKANOW as the Leader in Enterprise Security Solutions in its annual Cyber Defense Magazine Awards program. The award was announced after many months of review by leading independent information security experts. “We’re thrilled to recognize next-generation innovation in the information security marketplace. That’s why IKANOW has earned this award from Cyber Defense Magazine. …

  • kyivoblenergo-customer-letter

    Critical Infrastructure Cybersecurity Risk Realized – Things Have Changed

    The Aurora Generator Test carried out by Idaho National Laboratory in 2007 introduced much of the world to the idea that a cyber hack could cause damage and disrupt electricity distribution. While the test was real, the hack required a successful intrusion first and there were no real-world incidents that actually realized electricity disruption – until last month. By now, most people in the information security community are aware of the hack on at least two Ukrainian power authorities in Ivano-Frankivsk region. As much as high-profile cybersecurity attacks ranging from…

  • IKANOW_Data-Breach-Graphic_Dec-2015_V2

    Significant Data Breaches – December 2015

    As 2015 came to an end, the number of significant data breaches did not slow down. IKANOW’s major breach index along with a recap of the major data breaches that took place in December 2015 are listed below. Hyatt Hotels – Unknown Number of Records Exposed – Malicious Outsider Hyatt Hotels recently discovered malware on it’s network designed to steal credit card information. There are few details about this breach however it makes our monthly breach list as it’s a major organization that joins other hotel chains in having major breaches this…

  • ikanow_nov_graphic

    Significant Data Breaches – November 2015

    IKANOW’s major breach index along with a recap of the major data breaches that took place in November 2015 are listed below.   VTech – 5 Million Records Exposed – Malicious Outsider   Vtech, manufacturers of e-learning products and cordless telephones, was breached this month, exposing the records of approximately 4.8 million adults and 200,000 children. Exposed data included contact information, login credentials, download histories and personal information such as children’s age, gender, and birthdays. Photographs and chat logs of children and parents using the Kid Connect service were also…

  • ikanow_oct_graphic-1024x820

    Significant Data Breaches – October 2015

    IKANOW’s major breach index along with a recap of the major data breaches that took place in October 2015 are listed below.   Emergence Health Network – 11,000 records exposed – malicious outsider   Emergence Health Network, a nonprofit health service in El Paso, released a statement this month saying that one of its computer servers was compromised “Through an unauthorized Internet connection” as far back as 2012. The breach exposed the information of about 11,200 patients. Although the organization is confident that no medical records were contained within the…

  • office-space-boss_36733 copy

    Why the CISO Should Be A Peer, Not an Underling

    To Get Really Secure, First Empower Your Leadership: Why the CISO Should Be A Peer, Not an Underling Each time there’s a major security breach, organizations at all levels reevaluate their cyber security procedures and teams. In fact, 47 percent of C-suite executives  hold CISOs accountable for a breach. Some companies choose to use the CISO as a scapegoat but don’t address what it will really take to shore up their enterprise security – all too often this includes empowering the CISO within the C-suite. There’s significant value in having the CISO considered equal to…

  • ikanow_aug_graphic

    Significant Data Breaches – August 2015

    It looks like even hackers take vacations. The month of August only had one significant data breach.   Carphone Warehouse – $2.4M exposed – Malicious Outsider Carphone Warehouse is an independent mobile phone retailer, with over 1,700 stores across Europe, discovered that someone had unauthorized access on their network on August 5th and stopped it right away. They believe it the attack happened within the last 2 weeks. 2.4M customers were affected and up to 90,000 of them could have had their encrypted credit card details accessed. The company’s investigation…

  • source2-1024x636

    InfoSec Analytics: IKANOW’s Major New Release

    Next level infosec analytics We are thrilled to announce today the release of the next version of our Enterprise Edition Information Security Analytics (ISA) platform. This new release will feature several major enhancements to our previous Enterprise Edition.  These enhancements will bolster the ability to actively recalibrate your security posture by applying adaptable analytical techniques and measurement tools that automate analysis and decision-making processes. This new release will include: A simple 3-step source/data ingestion process Enhanced sorting and searching of data 3rd party integrations Ability to collaborate create comprehensive visualizations Let’s…

  • ikanow_may_infographic-1

    Significant Data Breaches – May 2015

    IKANOW’s major breach index along with a recap of the major data breaches that took place in May 2015 are listed below.   mSpy – Malicious Outsider – 400,000 records exposed KrebsonSecurity broke the news that mSpy, a brand of mobile and computer monitoring software for iOS, Android, Windows, and Mac OS, had been massively hacked. A huge amount of data was (apparently) stolen from the company’s servers and posted on the deep web. Emails, text messages, payment information, location data and more were exposed. World Trade Organization (WTO) – Hacktivist…

  • corporate_risk

    Corporate Risk Management added to CISO Portfolios

    CISOs who fret that corporate boards don’t pay enough attention to information security can take comfort in a trend that has CISOs expanding their responsibilities to include corporate risk management. In a recent Wisegate poll, nearly 100% of the respondents said they have this combined role. CISOs now have the opportunity to place information security within the larger corporate risk landscape and to share that perspective widely, particularly since many report to chief risk officers as well as CIOs. This change comes at a time when regulatory and compliance requirements…