Cisco includes Italtel’s enterprise SDN applicat... » Milan: Italtel has announced its Netwrapper application has been included in the official Cisco GPL ... InfinityQS upholds ISO 9001:2015 & ISO 27001:2013 ... » InfinityQS® International, Inc. (InfinityQS) has announced that it has successfully sustained its ce... New PT Application Firewall easier to deploy, co... » London: Cybersecurity expert Positive Technologies has announced a new version of its web applicatio... Logicalis acquires Packet Systems Indonesia to g... » London: Logicalis, an international IT solutions and managed services provider, together with Metrod... Revolutionary new AI event to launch in London -... » London: With discussion around artificial intelligence (AI) at an all-time high, MACHINA Summit.AI i... Basefarm acquires The unbelievable Machine Compa... » LONDON: Basefarm has announced their acquisition of the Berlin-based The unbelievable Machine Compan... PhishMe takes home SC Europe Awards 2017 » LONDON, UK: PhishMe® Inc. has announced that PhishMe Simulator™ and PhishMe Reporter® were recognise... Prevalent acquires Datum Security for SMB third-... » WARREN, NJ:  Prevalent, Inc. has announced the acquisition of Datum Security, the leader in Third Pa... LAST CHANCE TO GAIN RECOGNITION IN POWER PLAYERS... » There are just two weeks remaining for leading younger people (aged 39 or below) to enter this year’... LEADING BUSINESSES WIN TOP INDUSTRY AWARDS » An independent panel of judges, who included the ECA’s Paul Reeve (Head Judge), Philip Buckle, Direc...



Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.


Case Studies

Following the recent report that an unsecured backup drive is to blame for a major data leak at the US Air Force: US Air Force leak exposes 'holy grail' of top secret data including details of over 4,000 officers. In response, Jonathan Sander, CTO, STEALTHbits Technologies reacts:

“When people see that a system misconfiguration leads to sensitive data like the USAF top secret data leaking out, they often conclude that the admins are only human and there’s only so much they can do. The problem is that is the end of their thought, instead of moving to the realization that their humans desperately need automated help. This was found, luckily, by a good guy using automated scanning to see what they could find. It’s the kind of thing that can be – an may have been – found by the bad guys. They are using automation to do their work, and we need the government to equip our good guys to do the same.”

Robert Capps, VP of Business Development, NuData Security says: “This is a serious data leak, which allows nation states to target high-value military personnel for additional attacks and surveillance. If that weren’t bad enough, this highly detailed data could potentially be combined with stolen personal data from other data breaches already available on the dark web to create rich profiles of these individuals. Such profiles can be leveraged by cybercriminals and nation-state actors to not only track military personnel, but also use their real identities for account takeovers, apply for new credit, and much more. The military personnel involved in this incident should immediately request a credit freeze with the major credit bureaus, and keep close track of account activity through commercial credit monitoring services, or monitoring of their own accounts.”

David Vergara, Head of Global Product Marketing, VASCO Data Security, adds: “Hollywood plays up sophisticated methods to gain access to sensitive data as it makes for great movies, but the reality is most leaked data results from easy targets like an unsecured drive left behind at an airport or cab and other low-tech schemes. Regardless of the leak point, there is a simple “silver bullet” that secures data, it’s encryption. Modern encryption solutions are not only widely available for all types of end-point devices they’re also inexpensive. Especially in light of the costs that businesses and, of course, the government will now shoulder to protect (i.e. credit monitoring) individuals affected, address related fines and repair the brand. Businesses and government agencies are getting better about utilizing encryption, but it needs to be deployed more ubiquitously across mobile, network, storage and other channels. Once encryption has been addressed, then they can focus on other vulnerabilities like mobile malware.”