Gartner: 2018 IoT Security Spending To Reach $1.5 Billion

Gartner: 2018 IoT Security Spending To Reach $1.5 Billion

Gartner predict that worldwide spending on IoT security will reach $1.5 billion in 2018. Comparing with 2017 IoT security spending will increase by 28% (from $1.2 billion). Gartner says by 2021, such concerns will push IoT security spending to over $3.1 billion. Worldwide IoT Security Spending Forecast (Millions of Dollars) 2016 2017 2018 2019 2020 2021 Endpoint Security 240 302 373 459 541 631 Gateway Security 102 138 186 251 327 415 Professional Services 570 734 946 1,221 1,589 2,071 Total 912 1,174 1,506 1,931 2,457 3,118 Source: Gartner (March 2018) https://www.gartner.com/newsroom/id/3869181  

Cydome Security joins “Be Cyber Aware At Sea”

Cydome Security joins “Be Cyber Aware At Sea”

Cydome Security joins the Be Cyber At Sea initiative. The initiative is a global maritime and offshore industry initiative for increasing maritime threat awareness. Our company is dedicated to the Maritime Cybersecurity – and as such, we also believe that along with the right tools to detect, protect, response and mitigate – the human factor is critical. The Maritime personal should be well trained and understand the threats and how to minimize exposure.   “A global maritime and offshore industry initiative to raise awareness of the increasing maritime cyber threats to international shipping, ports and offshore operations. More than 90% of world trade including the global transportation of energy is […]

CyberTech TLV 2018

CyberTech TLV 2018

Cydome participated at CyberTech TLV 2018. Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States.Cybertech Conference & Exhibition will present commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors: finance transportation, utilities, defense, R&D, manufacturing, telecommunication, health and government. The conference will also provide the exhibition of different innovative technologies, which are key to fighting these threats. Cydome booth received a lot of attention as the only Maritime Cybersecurity startup in the event.  Cydome also was invited to this exclusive event along with other C-level executives from leading maritime companies.    […]

Data Protection and Cybersecurity Post-Brexit

Data Protection and Cybersecurity Post-Brexit

Uncertainty over Brexit is high and its full implications are still unknown, especially since no date has been set for the U.K. to exit the EU. But many are concerned about the impact Brexit could have on data privacy and U.K. cybersecurity. Data Privacy Regulations In terms of data protection, the U.K. will still be a part of the EU when the general data protection regulation becomes law in May 2018. All EU member states must comply, and the U.K. is no exception. Even before the referendum, the U.K.’s information commissioner’s office issued a statement reiterating the importance of data protection. It’s likely that, post-Brexit, the U.K. will update its […]

IT Outsourcing Grouth- Data Security and Privacy Concern

IT Outsourcing Grouth- Data Security and Privacy Concern

A new report released by Research and Markets, forecasts IT Outsourcing (ITO) market growth, for Asia and  Pacific market (APAC) while showing a real concern regarding data security and privacy. IT Outsourcing is growing In the report, industry expert say that ITO market in APAC will grow 5.80% by 2020. A key factors for this growth is the cloud computing: while enterprises already use the cloud infrastructure, SME can now also enjoy cloud services. This Key vendors in this reports are Accenture, Fujitsu, HP, IBM and TCS. DATA Security Concern Report states that data security and privacy concerns will be a challenge for the market. Data security and privacy concerns always remain significant challenges in any organization. Companies face pressure […]

Vine – source code data loss case

Vine – source code data loss case

Twitter’s Vine short video application was released today online by accident in July. Vine was acquired by Twitter in 2012 and creates six seconds videos. The dataloss was published by a security researcher that found a subdomain on Vine’s website which led to him discovering Vine’s entire source code available for download. The source code for apps and programs is usually a closely guarded secret as it shows the inner working of exactly how an app functions, and public exposure is a big security risk. Twitter removed the code within minutes and paid the researcher $10,000 for his finding.   Twitter’s Vine source code disclosure bug $10080#BugBountyhttps://t.co/ISQH4SqCMQ pic.twitter.com/Hb6fGw70Qw — avicoder (@avicoder) July 22, […]

Mobile Security Models

Mobile Security Models

Every organization today needs to have a mobile security road map. According to the 2016 Mobile Security & Business Transformation Study from ISMG, 99 percent of enterprise workers currently use mobile devices to perform their work tasks. Securing all of those devices requires that organizations take a formal approach to mobile security models — an ad hoc approach is not sufficient to manage enterprise risk from mobile threats. To enable businesses to embrace mobility in a secure manner, Samsung has forged a partnership with Booz Allen Hamilton to provide organizations with a comprehensive mobile security risk assessment. The risk assessment process is divided into seven domains, based around common themes […]

EU-US Privacy Shield

EU-US Privacy Shield

On 12 July 2016, the European Commission adopted the replacement for the EU-US Safe Harbor scheme – the so-called ‘Privacy Shield’. This is the new, EU-approved mechanism for the transatlantic transfer of personal data. The Privacy Shield will enter into force immediately and companies will be able to self-certify with the US Department of Commerce from 1 August 2016. This post, the first in our series on the Privacy Shield, provides an overview of the new framework. It has taken two and a half years of negotiations between the EU and the US to agree on a new framework for transatlantic data transfers. Following the publication of the draft text […]

Cyber threats continue to mount

Cyber threats continue to mount

As threats continue to mount, understanding and managing cybersecurity risks have become top of mind for leaders in business and government. Organisations are responding by taking action. Increasingly, they are adopting innovative technologies like cloud-enabled cybersecurity, Big Data analytics and advanced authentication to reduce cyber-risks and improve cybersecurity programmes. Businesses are also embracing a more collaborative approach to cybersecurity, one in which intelligence on threats and response techniques is shared with external partners. Internally, organisations are rethinking the roles of key executives and the Board of Directors to help create more resilient and proactive security capabilities. Another notable measure of progress is a renewed willingness to invest in security. This […]