FixNix is representing Startup world in the Cyber Security Task Force of Govt of India

National Association of Software and Services Companies (NASSCOM) and Data Security Council of India today announced the launch of the NASSCOM Cyber Security Task Force that aims to build India as a global hub for providing cyber security solutions, developing cyber security R&D plan and develop a skilled workforce of cyber security experts. https://pbs.twimg.com/media/CHJL3nXUYAA7pGc.jpg The taskforce members include industry leaders across IT, BPM and Internet, leaders from user organizations like…

Adding Cyber Security to Corporate Risk Management

Corporate boards and senior management like to focus on business. They love the numbers, the strategy and the success of a business operation. They have a passion for it and that is why they are sitting on board or managing a global company. They do not like to talk as much about risks, much less plan for them. When it comes to information governance and protecting the company from hackers…

RHSB’s Jones Receives Cyber Risk Management Leadership Award

Douglas R. Jones, senior vice president and principal at Texas-based Roach Howard Smith & Barton, was presented with the Cyber Risk Management Leadership Award 2014-15 at the annual Cyber Risk Management Boot Camp held in Atlanta, Ga., and hosted by INSUREtrust. The Cyber Risk Management Leadership Award is given to select independent agents that demonstrate expertise in cyber risk management, have addressed their own firm’s cyber risks, and have shown proficiency…

Hackers attack five US banks including JPMorgan Chase

          By Nicole Perlroth A number of US banks, including JPMorgan Chase and at least four others, were struck by hackers in a series of coordinated attacks this month, according to four people briefed on a continuing investigation into the crimes. The hackers infiltrated the networks of the banks, siphoning off gigabytes of data, including checking and savings account information, in what security experts described as…

6 trends that will shape Information security in 2014

Worldwide spending on information security will reach $71.1 billion in 2014, an increase of 7.9 percent over 2013. The data loss prevention segment will record fastest growth at 18.9. The increasing adoption of mobile, cloud, social and information (often interacting together) will drive use of new security technology and services through 2016.The nexus of forces, however, is impacting security in terms of new vulnerabilities. The bigger trend that emerged in…

US Nuclear Regulatory Commission hacked 3 times in 3 years

  Computers at the US Nuclear Regulatory Commission (NRC) have been hacked three times in the last three years, according to documents obtained under an open-records request. Two of the attacks are believed to have originated in foreign countries, while the source of the third remains unknown because incident logs have been destroyed. The first attack used a regular phishing email to trick staff into handing over their login credentials.…

Apple iOS found most secure mobile operating system against spywares: Report

WASHINGTON : A test conducted by a surveillance software and hardware vendor revealed that Apple iOS is the most secure mobile operating software against spywares. A spyware called FinSpy, designed to help Law Enforcement and Intelligence Agencies to remotely monitor mobile phones and tablet devices, was used to determine whether various mobile platforms could withstand snooping attempts on phone calls, contacts, and other data. The result showed that the spyware…

Why you need to add “cyber” to your job title

By Andrew Rose Sometimes ambiguity has power the power to capture the zeitgeist of a movement, culture, or vision without getting dragged into the weeds about what really is or isn’t included; it provides time for an idea to crystallize, become defined, or reach critical mass. That (somewhat arcane opening paragraph) sums up where I feel we are with regard to the term “cyber.” We all know that it has…

‘IoT’ is full of major security holes for hackers to find

The surge of Web-connected devices — TVs, refrigerators, thermostats, door locks and more — has opened up huge opportunities for cyberattacks because of weak security, researchers said Tuesday. A study by the Hewlett-Packard security unit Fortify found 70 percent of the most commonly used “Internet of Things” devices contain vulnerabilities, including inadequate passwords or encryption, or lax access restrictions. “While the Internet of Things will connect and unify countless objects…