Mercado seguridad...
Follow
Find
12.8K views | +10 today
 
Mercado seguridad TIC
Seguridad de la información, seguridad TIC, scada, infraestructuras críticas, SGSI, Protección datos personales,
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

Evento - Centro de Ciberseguridad Industrial

Evento - Centro de Ciberseguridad Industrial | Mercado seguridad TIC | Scoop.it
Centro de Ciberseguridad Industrial http://t.co/Fa3jppfU28
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

OWASP Internet of Things Top Ten Project - OWASP

OWASP Internet of Things Top Ten Project - OWASP | Mercado seguridad TIC | Scoop.it
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Un español 'hackea' un lujoso hotel chino para mostrar los fallos de seguridad - 20minutos.es

Un español 'hackea' un lujoso hotel chino para mostrar los fallos de seguridad - 20minutos.es | Mercado seguridad TIC | Scoop.it
Situado cerca de Hong Kong, tenía un sistema de control remoto para cada habitación que con los conocimientos necesarios se podía modificar con facilidad. "Puede levantar todas las ventanas a la vez o subir la temperatura por la noche de todas las habitaciones", recalca Jesús Molina, un joven de Ciudad Real. Presentará los resultados de su estudio en la mayor conferencia anual sobre seguridad tecnológica en Las Vegas.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

La recuperación de datos, una de las tareas en las que más tiempo se gasta

La recuperación de datos, una de las tareas en las que más tiempo se gasta | Mercado seguridad TIC | Scoop.it
Los departamentos de TI se esfuerzan por dar respuesta al Big Data sin olvidar la seguridad de la información.
more...
No comment yet.
Rescooped by Elisa Vivancos from Sustain Our Earth
Scoop.it!

Industrial control a weak link in cybersecurity, study says

Industrial control a weak link in cybersecurity, study says | Mercado seguridad TIC | Scoop.it
“ Cybersecurity threats are rising for industrial control systems around the world, a growing target for attackers seeking to wreak havoc, a study showed Thursday.”
Via SustainOurEarth
more...
No comment yet.
Rescooped by Elisa Vivancos from Data Security
Scoop.it!

Infosecurity Europe 2014 > Big Data is No Universal Solution for Security ... - Infosecurity Magazine

Infosecurity Europe 2014 > Big Data is No Universal Solution for Security ... - Infosecurity Magazine | Mercado seguridad TIC | Scoop.it
“ ITProPortal Infosecurity Europe 2014 > Big Data is No Universal Solution for Security ...”
Via Jonathan Baha'i
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Legacy cybersecurity products failed to protect 97% of organizations

Legacy cybersecurity products failed to protect 97% of organizations | Mercado seguridad TIC | Scoop.it
“ A new report examines attack data captured by FireEye security appliances from 1,217 organizations around the world from October 2013 to Mar...”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Top 10 technologies for information security in 2014

Top 10 technologies for information security in 2014 | Mercado seguridad TIC | Scoop.it
“ Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterp...”
Via A3Sec
more...
A3Sec's curator insight, June 25, 3:19 PM

Big Data security analytics at the heart of next-generation security platforms

Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Enisa gears up to focus on economic benefits of cyber security

Enisa gears up to focus on economic benefits of cyber security | Mercado seguridad TIC | Scoop.it
“ Enisa, plans to re-focus its efforts with a new strategy to put economic benefits at the forefront of all its activities”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Exploring the mobile security landscape

“ In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from Corporate Data Security Blog by SpectorSoft
Scoop.it!

Infosecurity - Insider Threats, Cloud, and Big Data Threaten Financial Sector

Infosecurity - Insider Threats, Cloud, and Big Data Threaten Financial Sector | Mercado seguridad TIC | Scoop.it
“When it comes to data security, the worst threats are perceived to come from partners and insiders. New research has revealed that more than half (55%) of European financial organizations believe third-party contractors pose the biggest risk; and 52% find insider threats harder to detect than last year.”
Via SpectorSoft (www.spectorsoft.com)
more...
SpectorSoft (www.spectorsoft.com)'s curator insight, June 11, 12:58 AM

“The definition of a ‘privileged user’ has changed massively in recent times – to encompass anybody with the necessary credentials to view and modify data across corporate networks, including contractors.”

Scooped by Elisa Vivancos
Scoop.it!

Los Planes Estratégicos Sectoriales (PES) en materia de protección de infraestructuras críticas (PIC), y el impacto que para los operadores de estas infraestructuras supone.

Los Planes Estratégicos Sectoriales (PES) en materia de protección de infraestructuras críticas (PIC), y el impacto que para los operadores de estas infraestructuras supone. | Mercado seguridad TIC | Scoop.it
En el presente seminario se describirá la situación actual
de los Planes Estratégicos Sectoriales (PES) en materia de
protección de infraestructuras críticas (PIC), y el impacto
que para los ope...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Constituida la Comisión Nacional para la Protección de las Infraestructuras Críticas, órgano responsable de la aprobación de los Planes Estratégicos Sectoriales - Noticias - Ministerio del Interior

Ministerio del Interior, Espa�a
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Vulnerabilidad en la doble autenticación de PayPal

Vulnerabilidad en la doble autenticación de PayPal | Mercado seguridad TIC | Scoop.it
Un joven hacker ha descubierto una vulnerabilidad en la doble autenticación de PayPal, la firma propiedad de eBay
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Most Valuable Sources on #InfoSec | Listly List

The business model of hackers is based on always being a step ahead on the development of effective protection mechanisms.

Therefore publishing and sharing information on how to protect against attackers is a pivot in fighting Cyber Crime, Data Theft and Fraud.

Good guys share their information . . . www.virtualforge.com | Twitter: @Virtual_Forge | Ars Technica - Risk Assessment / Security & Hacktivism, BankInfoSecurity.com - by Tracy Kitten, BCW - Business Computing World, Bizec.org - The Business Security Community, Cigital's SILVER BULLET SECURITY PODCAST with Gary McGraw, Common Exploits - Exploitation Tools & Techniques For Penetration Testers - by Daniel Compton, CSO Online - Security and Risk, Cyber Crimes Unit, Cybersecurity Headlines | Cybersecurity news from around the globe, and Cyber War News
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Descubren un grave fallo de seguridad en los USB que compromete los ordenadores, ratones, discos duros y móviles

Descubren un grave fallo de seguridad en los USB que compromete los ordenadores, ratones, discos duros y móviles | Mercado seguridad TIC | Scoop.it
Las memorias USB tienen un importante fallo de seguridad en su diseño que permiten instalar un malware indetectable llamado BadUSB y usarlos para tomar el control de un ordenador
more...
No comment yet.
Rescooped by Elisa Vivancos from APRENDIZAJE
Scoop.it!

How To Actually Delete your Digital Footprint - Edudemic

How To Actually Delete your Digital Footprint - Edudemic | Mercado seguridad TIC | Scoop.it
“ Helping students understand their digital footprint is an integral part of being a good digital citizen. Knowing that you leave behind a little trail of digital breadcrumbs as you conduct your digital life is useful - and can even help you in some scenarios (like when you need to hunt down something you remember seeing …”
Via Marta Torán
more...
Marta Torán's curator insight, July 29, 2:00 PM

Consejos para "desaparecer" o borrar tu huella digital.

Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

CISOs say SIEM not a good choice for big data security analytics

“ A panel of security execs at the 2014 RSA Conference are all trying to harness big data security analytics, but had to supplement SIEM products with tools like Splunk and Hadoop.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Splunk For Security Vs. SIEM

“ Splunk For Security Vs. SIEM: What's the difference between a traditional SIEM and Splunk for Security? Splunk's Security Intelligence Platform, consisting o...”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Who is ultimately responsible for data security in the cloud?

Who is ultimately responsible for data security in the cloud? | Mercado seguridad TIC | Scoop.it
“ Catalin Cosoi, Chief Security Strategist at Bitdefender, examines where responsibility lies for data breaches and whether more education is needed regarding the security of data.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

‘Destapadas’ las herramientas con las que los gobiernos hackean los móviles

‘Destapadas’ las herramientas con las que los gobiernos hackean los móviles | Mercado seguridad TIC | Scoop.it
“ Dos estudios independientes identifican y decodifican las herramientas de espionaje que utilizan los gobiernos para secuestrar teléfonos móviles.”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from Alertes et Conseils Sécurité "AutreMent"
Scoop.it!

[Infosecurity Europe 2013] Le big data au service de la sécurité

[Infosecurity Europe 2013] Le big data au service de la sécurité | Mercado seguridad TIC | Scoop.it
Infosecurity, premier salon européen de la sécurité, qui s'est déroulé à Londres la semaine passée, a permis d'identifier de vraies prises de position et quelques nouveautés.
Via L'Info Autrement
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Security Bits: Detectando ataques via Wi-Fi con Kismet y Alienvault USM (I: Introducción)

Security Bits: Detectando ataques via Wi-Fi con Kismet y Alienvault USM (I: Introducción) | Mercado seguridad TIC | Scoop.it
“ Software & Security Services (#SIEM Mejora tu capacidad de deteccion con tu #AlienVault #USM http://t.co/K5ovky7o5D)”
Via A3Sec
more...
No comment yet.
Rescooped by Elisa Vivancos from Protection Données Personnelles - Big Data
Scoop.it!

Infosecurity - ICO Doles Out Big Data Advice to UK Firms

Infosecurity - ICO Doles Out Big Data Advice to UK Firms | Mercado seguridad TIC | Scoop.it
“ Don’t even think about embarking on a project without considering data protection repercussions, privacy watchdog warns.”
Via Loic Lecomte
more...
Loic Lecomte's curator insight, July 29, 8:35 AM

"UK privacy watchdog the Information Commissioner’s Office (ICO) has released a new report warning firms they must be transparent and abide by data protection principles when embarking on big data projects."

Scooped by Elisa Vivancos
Scoop.it!

Interior apuesta por 'nuevas estrategias' para garantizar la seguridad de las empresas que prestan servicios esenciales

Interior apuesta por 'nuevas estrategias' para garantizar la seguridad de las empresas que prestan servicios esenciales | Mercado seguridad TIC | Scoop.it
 El secretario de Estado de Seguridad, Francisco Martínez ha subrayado la evidente necesidad de poner en práctica 'nuevas estrategias y políticas' para garantizar la seguridad de las empresas que prestan servicios esenciales ante las amenazas derivadas de posibles ataques deliberados, con origen ...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Cover Story: Top ten differences between ICS and IT cybersecurity

Cover Story: Top ten differences between ICS and IT cybersecurity | Mercado seguridad TIC | Scoop.it

Understanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconected camps.

Understanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpufUnUnderstanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpufUnderstanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpufUnderstanding the different needs of ICS and IT system security leads to cooperation and collaboration between historically disconnected camps - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpuf
Elisa Vivancos's insight:
his article discusses how ICSs differ from IT systems as they relate to cybersecurity. It is important that IT and ICS professionals jointly understand the following top ten differences and develop workable security solutions that benefit the whole organization. - See more at: https://www.isa.org/intech/20140601/#sthash.i48tt2qR.dpuf
more...
No comment yet.