Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Issues surrounding the Android mediaserver component continue. Google recently raised the severity of this vulnerability to “critical,” indicating that arbitrary code execution is possible. As with other recent Android vulnerabilities, this could lock a hacked device in an endless reboot loop.
The latest research from MarketResearch.com forecasts the global cybersecurity market to jump from $106.32 billion in 2015 to $170.21 billion by 2020.
In this is the third post of the “FuTuRology” project, the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of popular technologies. In the last two installments of this series, we introduced our future technology threat landscape project and started to paint a picture of how the healthcare industry might look like in a few years.
The mobile landscape in the first half of 2015 is highlighted by vulnerabilities found on the operating systems and apps, including ones that came with the devices themselves. A number of notable incidents and cases over the last few months have shown how these vulnerabilities were used as avenues for exploitation.
The Senate on Wednesday confirmed suspicions that it would once again delay action on a long-stalled cybersecurity bill, putting any progress on the measure off until after the August recess and possibly far beyond.
Federal agencies send their technology officers to cybersecurity conferences so they can gauge the industry and devise strategies for their own systems. Many were in attendance for “The Future of Security and Compliance in a Hostile World” on Wednesday at the Willard Intercontinental in Washington.
Deep Security 9.6 was recently launched and builds upon a rich history of being the only true single security platform with advanced threat protection capabilities built to work seamlessly with key virtualization and cloud providers including VMware, AWS and Microsoft Azure.
In today’s rapidly changing legal landscape, global companies confront a litany of cyber security issues domestic and international. One issue quickly rising to the top is CIO and CISO cyber security liability.
There’s a growing need for more female cybersleuths. Not only can women fill the estimated nearly 210,000 vacant cybersecurity positions in the United States, they can also bring new perspectives.
Please add your thoughts in the comments below or follow me on Twitter; @GavinDonovan.