Information Security rating and labeling magazine

By Antonio Ramos | This magazine covers issues related with rating and labeling the information security of ICT services

Gestionar el riesgo de los proveedores como propio

La externalización de procesos no es algo que podamos considerar como una novedad. Más bien todo lo contrario. Y en particular, en lo que respecta a …

La caída de Amazon S3 rompe medio Internet

La caída de una de las zonas de AWS S3 es una muestra de la gran dependencia que internet tiene a Amazon y sus servicios de infraestructura</b> …

Banks fail to enforce cybersecurity standards on third-party providers: FDIC watchdog

Banks are woefully unprepared to face potential cybersecurity threats stemming from third-party technology providers, according to a report issued …

Banking

40% of cloud services are commissioned without the involvement of IT

Intel Security released its second annual cloud security report, “Building Trust in a Cloudy Sky,” at RSA Conference 2017. The report outlines the …

Insurers tap cyber security ratings

New breed of start-ups aims to assess strength of companies’ defences against hackers

Cybersecurity

Estados Unidos acusa a un empleado de la NSA de robar información clasificada

El sospechoso habría extraído documentos de la misma agencia afectada por las filtraciones de Snowden<p>Un empleado del Gobierno de Estados Unidos ha …

FBI arrested another NSA contractor involved in theft of secret documents

Once again an NSA contractor is the headlines for the alleged theft of secret exploit codes and highly confidential documents.The FBI has arrested …

After Snowden, Another Booz Allen Contractor Accused Of Stealing NSA Files

The NSA might have another leaker on its hands thanks to a Booz Allen Hamilton employee, though investigators are unsure of his motives. (AP Photo/Patrick Semansky, File)<p>Booz Allen Hamilton stock took a trip south today on news that a former employer had been arrested over allegations he’d used his …

National Security Agency (NSA)

Why attaching security to each piece of data is critical

Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My …

Security

NSA Contractor Arrested for Stealing Classified Information

The NSA has another contractor who stole classified documents. It's a weird story: "But more than a month later, the authorities cannot say with …

Edward Snowden

N.S.A. Contractor Arrested in Possible New Theft of Secrets

WASHINGTON — The F.B.I. secretly arrested a former National Security Agency contractor in August and, according to law enforcement officials, is investigating whether he stole and disclosed highly classified computer code developed by the agency to hack into the networks of foreign governments.<p>The …

Government

Security still the biggest challenge in cloud management

CIOs are the C-suite executives most intensively advocating and driving migration of their organizations’ IT resources to the cloud. A new Unisys …

Cloud Computing

Four IT trends CIOs need to know about

CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Big Data

The Epic Fight Over How To Label “Natural” Foods | Fast Company | The Future Of Business

By Neal Ungerleider08.03.16 | 5:15 pm<p>Walk around a local farmers’ market or a big chain like Whole Foods or even Walmart and you’ll be overwhelmed by the sheer variety of “natural” and “healthy” foods. Consumers want foods they believe offer more health benefits and are made without artificial …

Food Industry

Are Cybercriminals Playing Leapfrog in Your Supply Chain?

NEW FROM CSX<p>Are Cybercriminals Playing Leapfrog in Your Supply Chain?<p>By Ed Cabrera, CISA, CISSP<p><b>The Nexus | 13 June 2016</b><p>For more than 20 years, the …

Piratas informáticos roban millones de euros a varios bancos

Los ciberdelincuentes usaron la mensajería SWIFT para efectuar el robo<p>El mito de la seguridad de los bancos se resquebraja. Piratas informáticos han …

Cloud Security Workshop: Building Trust in Cloud Services Certification and Beyond

The cloud security workshop will be facilitated by the European Commission and will focus on the issues shown in this agenda. In each session …

Cloud Computing

Lessons in External Dependency and Supply Chain Risk Management

Loading the video......<p>Abstract<p>In this webinar, John Haller and Matthew Butkovic of the CERT Division of the Software Engineering Institute will …

Cybersecurity

El seguro de ciberriesgos alcanzará los 20.000 millones de dólares

Las primas mundiales de seguros cibernéticos superarán los 20.000 millones de dólares en la próxima década, frente a los 2.000 millones que capta en …

LEET Security trabajará con INCIBE

Desarrollará el modelo de construcción de capacidades de ciberseguridad industrial para la institución

Leet Security desarrollará un modelo de construcción de capacidades de ciberseguridad industrial para Incibe

El Instituto Nacional de Ciberseguridad (Incibe) y la compañía Leet Security, han firmado un convenio de colaboración para el desarrollo conjunto del …

OPM Breach: Training and Skills Are Key to Safeguarding Information

<b>Body:</b>In a recently filed class-action lawsuit filed against OPM, the plaintiffs cited a November 2014 Office of the Inspector General (OIG) report …

Cybersecurity

21.5 Million Americans Were Compromised In OPM's Second Breach

The Office of Personnel Management said Thursday that 21.5 million American had their Social Security numbers and other sensitive data stolen in the second breach to OPM’s background check database.<p>Anyone who submitted a background investigation form since the year 2000 likely had their information …

Data Breach

LEET Security. ICT Services Rating Agency.

As stated in the note published by Adif, yesterday at 06:00 there were detected “intermitten failures in traffic management operating processes" that …

Día negro para el transporte público por sendas averías en Rodalies y metro

Adif acusa a su proveedor informático del último caos de Rodalies<p>El pasado mes de abril sufrió dos incidencias que también dejaron sin servicio a …

Driving Value Through Supply Management - Mark Atwood

When we look overall at Supply Chain strategy and governance, one of the areas that stands out as a particular challenge is Supply Management, …

Customers' Trust About Personal Data Can't Be Bought

With more companies offering up customers’ personal data for sale, governments are moving to intervene more deeply. In the U.S., for example, the Obama administration has proposed a wide-ranging bill intended to provide Americans with more control over the information that companies collect about …

Data Management
Government (UK)