Mercado seguridad...
Follow
Find
12.4K views | +19 today
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
onto Mercado seguridad TIC
Scoop.it!

Why Cyber Security is Important [Infographic]

Why Cyber Security is Important [Infographic] | Mercado seguridad TIC | Scoop.it
Today's infographic is about the AlienVault Open Threat Exchange or OTX, which is a multinational effort to aggregate, and disseminate the fingerprints and  forensics of the latest cyber attacks. The infographic is full of statistics on malware, hack attacks and such.

Via Gust MEES
more...
Angela Watkins's curator insight, April 18, 2013 10:04 AM

Sharing only for information ....  ............. As much as I love the digital avenues there are pros and cons so be careful/watchful .... Watch & Pray ...... 

Paula Correia's curator insight, April 19, 2013 2:15 AM

Porque é que a cibersegurança é importante?

O infográfico mostra estatísticas relacionadas com a falta de segurança no universo cibernético e nas redes de comunicação (malware, ataques de hackers etc.) e chama a atenção para os riscos dos ataques cibernéticos (Propriedade intelectual, privacidade pessoal, etc..)

Zhao KQiang's curator insight, March 27, 3:56 AM

the graph shows the  information about lots of internet connector of the majority countries have the risk of lost information of finance or personal information

Mercado seguridad TIC
Seguridad de la información, seguridad TIC, scada, infraestructuras críticas, SGSI, Protección datos personales,
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

Evento - Centro de Ciberseguridad Industrial

Evento - Centro de Ciberseguridad Industrial | Mercado seguridad TIC | Scoop.it
Centro de Ciberseguridad Industrial http://t.co/Fa3jppfU28
more...
No comment yet.
Rescooped by Elisa Vivancos from APRENDIZAJE
Scoop.it!

How To Actually Delete your Digital Footprint - Edudemic

How To Actually Delete your Digital Footprint - Edudemic | Mercado seguridad TIC | Scoop.it
“ Helping students understand their digital footprint is an integral part of being a good digital citizen. Knowing that you leave behind a little trail of digital breadcrumbs as you conduct your digital life is useful - and can even help you in some scenarios (like when you need to hunt down something you remember seeing …”
Via Marta Torán
more...
Marta Torán's curator insight, July 29, 11:00 AM

Consejos para "desaparecer" o borrar tu huella digital.

Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

CISOs say SIEM not a good choice for big data security analytics

“ A panel of security execs at the 2014 RSA Conference are all trying to harness big data security analytics, but had to supplement SIEM products with tools like Splunk and Hadoop.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Splunk For Security Vs. SIEM

“ Splunk For Security Vs. SIEM: What's the difference between a traditional SIEM and Splunk for Security? Splunk's Security Intelligence Platform, consisting o...”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Who is ultimately responsible for data security in the cloud?

Who is ultimately responsible for data security in the cloud? | Mercado seguridad TIC | Scoop.it
“ Catalin Cosoi, Chief Security Strategist at Bitdefender, examines where responsibility lies for data breaches and whether more education is needed regarding the security of data.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

‘Destapadas’ las herramientas con las que los gobiernos hackean los móviles

‘Destapadas’ las herramientas con las que los gobiernos hackean los móviles | Mercado seguridad TIC | Scoop.it
“ Dos estudios independientes identifican y decodifican las herramientas de espionaje que utilizan los gobiernos para secuestrar teléfonos móviles.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from Alertes et Conseils Sécurité "AutreMent"
Scoop.it!

[Infosecurity Europe 2013] Le big data au service de la sécurité

[Infosecurity Europe 2013] Le big data au service de la sécurité | Mercado seguridad TIC | Scoop.it
Infosecurity, premier salon européen de la sécurité, qui s'est déroulé à Londres la semaine passée, a permis d'identifier de vraies prises de position et quelques nouveautés.
Via L'Info Autrement
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Security Bits: Detectando ataques via Wi-Fi con Kismet y Alienvault USM (I: Introducción)

Security Bits: Detectando ataques via Wi-Fi con Kismet y Alienvault USM (I: Introducción) | Mercado seguridad TIC | Scoop.it
“ Software & Security Services (#SIEM Mejora tu capacidad de deteccion con tu #AlienVault #USM http://t.co/K5ovky7o5D)”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from Protection Données Personnelles - Big Data
Scoop.it!

Infosecurity - ICO Doles Out Big Data Advice to UK Firms

Infosecurity - ICO Doles Out Big Data Advice to UK Firms | Mercado seguridad TIC | Scoop.it
“ Don’t even think about embarking on a project without considering data protection repercussions, privacy watchdog warns.”
Via Loic Lecomte
more...
Loic Lecomte's curator insight, July 29, 5:35 AM

"UK privacy watchdog the Information Commissioner’s Office (ICO) has released a new report warning firms they must be transparent and abide by data protection principles when embarking on big data projects."

Scooped by Elisa Vivancos
Scoop.it!

Interior apuesta por 'nuevas estrategias' para garantizar la seguridad de las empresas que prestan servicios esenciales

Interior apuesta por 'nuevas estrategias' para garantizar la seguridad de las empresas que prestan servicios esenciales | Mercado seguridad TIC | Scoop.it
 El secretario de Estado de Seguridad, Francisco Martínez ha subrayado la evidente necesidad de poner en práctica 'nuevas estrategias y políticas' para garantizar la seguridad de las empresas que prestan servicios esenciales ante las amenazas derivadas de posibles ataques deliberados, con origen ...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Cover Story: Top ten differences between ICS and IT cybersecurity

Cover Story: Top ten differences between ICS and IT cybersecurity | Mercado seguridad TIC | Scoop.it

Understanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconected camps.

Understanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpufUnUnderstanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpufUnderstanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpufUnderstanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpuf
Elisa Vivancos's insight:
his article discusses how ICSs differ from IT systems as they relate to cybersecurity. It is important that IT and ICS professionals jointly understand the following top ten differences and develop workable security solutions that benefit the whole organization. - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpuf
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Active Directory flaw impacts 95% of Fortune 1000 companies

Active Directory flaw impacts 95% of Fortune 1000 companies | Mercado seguridad TIC | Scoop.it
“ Aorato identified a new threatening flaw within Active Directory that enables attackers to change a victim's password, despite current secur...”
Via A3Sec
more...
A3Sec's curator insight, July 15, 1:44 AM

A3SEC Security advise

Rescooped by Elisa Vivancos from Sustain Our Earth
Scoop.it!

Industrial control a weak link in cybersecurity, study says

Industrial control a weak link in cybersecurity, study says | Mercado seguridad TIC | Scoop.it
“ Cybersecurity threats are rising for industrial control systems around the world, a growing target for attackers seeking to wreak havoc, a study showed Thursday.”
Via SustainOurEarth
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

La recuperación de datos, una de las tareas en las que más tiempo se gasta

La recuperación de datos, una de las tareas en las que más tiempo se gasta | Mercado seguridad TIC | Scoop.it
Los departamentos de TI se esfuerzan por dar respuesta al Big Data sin olvidar la seguridad de la información.
more...
No comment yet.
Rescooped by Elisa Vivancos from Sustain Our Earth
Scoop.it!

Industrial control a weak link in cybersecurity, study says

Industrial control a weak link in cybersecurity, study says | Mercado seguridad TIC | Scoop.it
“ Cybersecurity threats are rising for industrial control systems around the world, a growing target for attackers seeking to wreak havoc, a study showed Thursday.”
Via SustainOurEarth
more...
No comment yet.
Rescooped by Elisa Vivancos from Data Security
Scoop.it!

Infosecurity Europe 2014 > Big Data is No Universal Solution for Security ... - Infosecurity Magazine

Infosecurity Europe 2014 > Big Data is No Universal Solution for Security ... - Infosecurity Magazine | Mercado seguridad TIC | Scoop.it
“ ITProPortal Infosecurity Europe 2014 > Big Data is No Universal Solution for Security ...”
Via Jonathan Baha'i
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Legacy cybersecurity products failed to protect 97% of organizations

Legacy cybersecurity products failed to protect 97% of organizations | Mercado seguridad TIC | Scoop.it
“ A new report examines attack data captured by FireEye security appliances from 1,217 organizations around the world from October 2013 to Mar...”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Top 10 technologies for information security in 2014

Top 10 technologies for information security in 2014 | Mercado seguridad TIC | Scoop.it
“ Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterp...”
Via A3Sec
more...
A3Sec's curator insight, June 25, 12:19 PM

Big Data security analytics at the heart of next-generation security platforms

Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Enisa gears up to focus on economic benefits of cyber security

Enisa gears up to focus on economic benefits of cyber security | Mercado seguridad TIC | Scoop.it
“ Enisa, plans to re-focus its efforts with a new strategy to put economic benefits at the forefront of all its activities”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Exploring the mobile security landscape

“ In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from Corporate Data Security Blog by SpectorSoft
Scoop.it!

Infosecurity - Insider Threats, Cloud, and Big Data Threaten Financial Sector

Infosecurity - Insider Threats, Cloud, and Big Data Threaten Financial Sector | Mercado seguridad TIC | Scoop.it
“When it comes to data security, the worst threats are perceived to come from partners and insiders. New research has revealed that more than half (55%) of European financial organizations believe third-party contractors pose the biggest risk; and 52% find insider threats harder to detect than last year.”
Via SpectorSoft (www.spectorsoft.com)
more...
SpectorSoft (www.spectorsoft.com)'s curator insight, June 10, 9:58 PM

“The definition of a ‘privileged user’ has changed massively in recent times – to encompass anybody with the necessary credentials to view and modify data across corporate networks, including contractors.”

Scooped by Elisa Vivancos
Scoop.it!

Los Planes Estratégicos Sectoriales (PES) en materia de protección de infraestructuras críticas (PIC), y el impacto que para los operadores de estas infraestructuras supone.

Los Planes Estratégicos Sectoriales (PES) en materia de protección de infraestructuras críticas (PIC), y el impacto que para los operadores de estas infraestructuras supone. | Mercado seguridad TIC | Scoop.it
En el presente seminario se describirá la situación actual
de los Planes Estratégicos Sectoriales (PES) en materia de
protección de infraestructuras críticas (PIC), y el impacto
que para los ope...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Constituida la Comisión Nacional para la Protección de las Infraestructuras Críticas, órgano responsable de la aprobación de los Planes Estratégicos Sectoriales - Noticias - Ministerio del Interior

Ministerio del Interior, Espa�a
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Top 10 technologies for information security in 2014

Top 10 technologies for information security in 2014 | Mercado seguridad TIC | Scoop.it
“ Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterp...”
Via A3Sec
more...
A3Sec's curator insight, June 25, 12:19 PM

Big Data security analytics at the heart of next-generation security platforms

Rescooped by Elisa Vivancos from Cybersecurity and Technology
Scoop.it!

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS - CyberWar: Si Vis Pacem, Para Bellum CyberWar

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS - CyberWar: Si Vis Pacem, Para Bellum CyberWar | Mercado seguridad TIC | Scoop.it
“ book paper news tool weapon doctrine scada vxworks protocol attack packet warfare military richard clarke robert knake national security threat (#CyberWar : Cybersecurity for Industrial Control Systems: SCADA, DCS, #PLC, HMI, and SIS”
Via Jose Ramon Coz
more...
No comment yet.
Rescooped by Elisa Vivancos from Mobile Technology
Scoop.it!

Ya disponible para comprar el Blackphone, el smartphone de máxima seguridad y privacidad

Ya disponible para comprar el Blackphone, el smartphone de máxima seguridad y privacidad | Mercado seguridad TIC | Scoop.it
“ El Blackphone ha tenido bastante repercusión debido a apostar por un aspecto muy demandado, la seguridad y la privacidad.”
Via JM - Axioma WebLab, Jesús Hernández
more...
JM - Axioma WebLab's curator insight, July 17, 8:50 AM

TE preocupa la seguridad de tus datos en tu SmartPhone ?... si es asi, te dejo un articulo sobre el teléfono inteligente mas seguro del mundo.