Information Security rating and labeling magazine

By Antonio Ramos | This magazine covers issues related with rating and labeling the information security of ICT services

El misterio de las estrellas de los hoteles

España, agosto 2017. Las previsiones apuntan a que en estos nueve primeros meses del año van a entrar en el país casi un 9% más de turistas …

¿Etiquetas de eficiencia antihacker para los dispostivos IoT? La solución obvia que nadie sabe cómo hacer

En esta era hiperconectada en la que cada dispositivo con conexión a internet parece ser secuestrado por criminales para lanzar ataques cibernéticos, …

Smart fridges and TVs should carry security rating, police chief says

At-a-glance security information should be beside energy efficiency ratings to protect households according to Durham chief constable Mike Barton<p>Televisions, fridges and other internet-connected home appliances should carry cyber security ratings alongside energy efficiency ratings, a police chief …

Internet of Things

Los ciberataques afectan a tres de cada cuatro empresas en España

España es el tercer país del mundo que más ataques informáticos recibe. En 2016 se detectaron 115.000 incidentes, de los que 480 afectaron a …

Una de cada cuatro empresas tiene un alto riesgo de sufrir un ciberataque

Sólo el 40% de las empresas evalúa los niveles de seguridad de sus proveedores externos durante toda su relación, a pesar de que un 47,6% de los …

19 April 2017

Gestionar el riesgo de los proveedores como propio

La externalización de procesos no es algo que podamos considerar como una novedad. Más bien todo lo contrario. Y en particular, en lo que respecta a …

La caída de Amazon S3 rompe medio Internet

La caída de una de las zonas de AWS S3 es una muestra de la gran dependencia que internet tiene a Amazon y sus servicios de infraestructura</b> …

Banks fail to enforce cybersecurity standards on third-party providers: FDIC watchdog

WASHINGTON — Banks are woefully unprepared to face potential cybersecurity threats stemming from third-party technology providers, according to a …

Cybersecurity

40% of cloud services are commissioned without the involvement of IT

Intel Security released its second annual cloud security report, “Building Trust in a Cloudy Sky,” at RSA Conference 2017. The report outlines the …

Cybersecurity

Insurers tap cyber security ratings to limit liabilities

When a single cyber attack brought down several major sites including Spotify, Twitter and the New York Times, it highlighted a problem insurers have …

Estados Unidos acusa a un empleado de la NSA de robar información clasificada

El sospechoso habría extraído documentos de la misma agencia afectada por las filtraciones de Snowden<p>Un empleado del Gobierno de Estados Unidos ha …

FBI arrested another NSA contractor involved in theft of secret documents

Once again an NSA contractor is the headlines for the alleged theft of secret exploit codes and highly confidential documents.<p>The FBI has arrested …

After Snowden, Another Booz Allen Contractor Accused Of Stealing NSA Files

The NSA might have another leaker on its hands thanks to a Booz Allen Hamilton employee, though investigators are unsure of his motives. (AP Photo/Patrick Semansky, File)<p>Booz Allen Hamilton stock took a trip south today on news that a former employer had been arrested over allegations he’d used his …

National Security Agency (NSA)

Why attaching security to each piece of data is critical

Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My …

Cybersecurity

NSA Contractor Arrested for Stealing Classified Information

The NSA has another contractor who stole classified documents. It's a weird story: "But more than a month later, the authorities cannot say with …

National Security Agency (NSA)

Security still the biggest challenge in cloud management

CIOs are the C-suite executives most intensively advocating and driving migration of their organizations’ IT resources to the cloud. A new Unisys …

in order to

Four IT trends CIOs need to know about

CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Mobile Apps

The Epic Fight Over How To Label “Natural” Foods

The FDA is trying to come up with a definition for “natural” foods, but it’s not so easy.<p>Walk around a local farmers’ market or a big chain like Whole Foods or even Walmart and you’ll be overwhelmed by the sheer variety of “natural” and “healthy” foods. Consumers want foods they believe offer more …

Nutrition

Are Cybercriminals Playing Leapfrog in Your Supply Chain?

NEW FROM CSX<p>Are Cybercriminals Playing Leapfrog in Your Supply Chain?<p>By Ed Cabrera, CISA, CISSP<p><b>The Nexus | 13 June 2016</b><p>For more than 20 years, the …

Cybersecurity

Piratas informáticos roban millones de euros a varios bancos

Los ciberdelincuentes usaron la mensajería SWIFT para efectuar el robo<p>El mito de la seguridad de los bancos se resquebraja. Piratas informáticos han …

Cloud Security Workshop: Building Trust in Cloud Services Certification and Beyond

The cloud security workshop will be facilitated by the European Commission and will focus on the issues shown in this agenda. In each session …

European News

Lessons in External Dependency and Supply Chain Risk Management

Loading the video......<p>Abstract<p>In this webinar, John Haller and Matthew Butkovic of the CERT Division of the Software Engineering Institute will …

Cybersecurity

El seguro de ciberriesgos alcanzará los 20.000 millones de dólares

Las primas mundiales de seguros cibernéticos superarán los 20.000 millones de dólares en la próxima década, frente a los 2.000 millones que capta en …

Leet Security desarrollará un modelo de construcción de capacidades de ciberseguridad industrial para Incibe

El Instituto Nacional de Ciberseguridad (Incibe) y la compañía Leet Security, han firmado un convenio de colaboración para el desarrollo conjunto del …

OPM Breach: Training and Skills Are Key to Safeguarding Information

<b>Body:</b>In a recently filed class-action lawsuit filed against OPM, the plaintiffs cited a November 2014 Office of the Inspector General (OIG) report …

Cybersecurity

21.5 Million Americans Were Compromised In OPM's Second Breach

The Office of Personnel Management said Thursday that 21.5 million American had their Social Security numbers and other sensitive data stolen in the second breach to OPM’s background check database.<p>Anyone who submitted a background investigation form since the year 2000 likely had their information …

Security