Report predicts $1T in cybersecurity spending by 2021 | How one cybersecurity firm uses email to detect insider threats | Are biometrics safe for banking?
Created for {EMAIL} | [Web Version]
July 7, 2016
[Â]
[Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[Report predicts $1T in cybersecurity spending by 2021]
A report from Cybersecurity Ventures projects $1 trillion in global spending on cybersecurity products and services during the next five years. "The cybersecurity space is ripe for [value-added resellers]," partly because of explosive growth in the market and a labor shortage, says Steve Morgan of Cybersecurity Ventures.
[CRN.com (U.S.)] (7/6)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[How one cybersecurity firm uses email to detect insider threats]
Online security companies are developing products that can monitor employees' email for "linguistic red flags" that could point to insider threats, Roger Parloff writes. Cybersecurity company Stroz Friedberg analyzes syntactic and grammatical clues that appear in employees' emails.
[Fortune] (7/1)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Are biometrics safe for banking?]
[Are biometrics safe for banking?]
(Peter Macdiarmid/Getty Images)
More banks are using biometrics for customer identification purposes rather than relying on passwords. Some experts see biometrics as safe and efficient, while others have concerns about security and privacy.
[The New York Times (free-article access for SmartBrief readers)] (7/5)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Cyber Risk
[HummingBad malware attacks 10M Android users]
More than 10 million Android devices have been infected by HummingBad, a piece of malware developed by Chinese advertising company Yingmob. Just 280,000 have been hacked in the US, where users own some 107 million Android devices.
[The Mary Sue] (7/5)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Smart-watch users need to protect ATM PIN numbers] IEEE Spectrum online (7/5)
By the Numbers
[True costs of cyberattacks still hard to quantify]
The potential costs to a company's reputation following a cyberattack make the financial costs of such events hard to quantify, writes Adam Uzialko. "Without really knowing what risk they're accepting, the insurance companies could be opening themselves up to massive losses, and so they remain hesitant to accept more risks," Uzialko writes.
[BusinessNewsDaily.com] (7/5)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Practice & Policy
[Column: Cybersecurity insurance could lead to better practices]
Dan Lohrmann, chief security officer and chief strategist at Security Mentor Inc., writes that cybersecurity insurance does more than provide a safety net for businesses and government agencies -- it may also provide an incentive for the insurance-holders to improve their practices.
[Government Technology] (7/2016)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Best practices to ensure hackers don't ruin your business] Small Business Computing (7/6)
AllClear ID News
4 steps to respond more effectively after a data breach
The most thorough preparation pre-breach won't matter if your response team is derailed by emotions like denial, tunnel-vision and anger. [Download this whitepaper], Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail your team and steps you can take now to be ready to address them during a crisis.
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Is your team ready for a data breach?
As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, customer-focused response. Consumers, regulators and the media want a well-orchestrated response launched just days after a data breach, and preparation in advance is critical to success. [Download this Incident Response Workbook] and learn:
- Key considerations for data breach preparation and customer notification
- Best practices for the customer-facing aspects of data breach response
- Recommendations for planning and executing a well-orchestrated response
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
A sheltered life can be a daring life as well. For all serious daring starts from within.
Eudora Welty,
writer
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2016 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â