1. Articles in category: Cyber Security

    25-48 of 147 « 1 2 3 4 5 6 7 »
    1. Will A.I. usher in a new era of hacking?

      It may take several years or even decades, but hackers won't necessarily always be human. Artificial intelligence -- a technology that also promises to revolutionize cybersecurity -- could one day become the go-to hacking tool.Organizers of the Cyber Grand Challenge, a contest sponsored by the U.S. defense agency DARPA, gave a glimpse of the power of AI during their August event. Seven supercomputers battled each other to show that machines can indeed find and patch software vulnerabilities.

      Read Full Article
    2. 7 Cybersecurity Best Practices That Regulated Industries Deal With

      Whether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity. Michael Hall, CISO, DriveSavers, provides a few best practices for businesses operating in or with regulated industries.

       

      Read Full Article
    3. What Hotels Teach Us About Data And Prioritizing User Experience Over Security

      As cyberattacks and data breaches become an ever-more common side effect of life in the digital era, the role of social engineering and the historical prioritization of user experience over security in facilitating those attacks has become a huge focal area of the cybersecurity industry. Yet, it is not just the digital world that is vulnerable to social engineering – almost every process we undertake in our daily lives is being impacted by technological evolution that far too often places ease-of-use over security.

      Read Full Article
    4. This malware attack starts with a fake customer-service call

      Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. The culprits in these hacks, which are designed to steal customers’ credit card numbers, appear to be the Carbanak gang, a group that was blamed last year for stealing as much as $1 billion from various banks.

      Read Full Article
    5. Push your account security into the modern age

      TalkTalk’s recent data breach is the latest in a long line of security incidents that have compromised the sensitive details of hundreds of millions of users.Similar incidents at LinkedIn, Sony, and Yahoo, are amongst the dozens of other hacks that together have put billions of accounts at risk.In order to address the issue of cyber security, companies often advise users to select complex, unique passwords for each account and recommend changing them frequently.However, the majority of consumers tend to reuse old passwords or choose weak ones, in spite of the risk this poses.

      Read Full Article
    6. Security Think Tank: Back up risk assessment with broker advice on cyber insurance

      The starting point for organisations considering cyber insurance is to conduct an information risk assessment. Once risks have been identified and assessed, treatment options can be investigated. Organisations may choose to mitigate, avoid or accept some of the assessed risks. If, however, transference is chosen to treat other assessed risks, then cyber insurance can be an option.

      Read Full Article
    7. Why IoT devices are the 'unusual suspects' in DDOS attacks

      Recent cyberattacks that harnessed digital devices to cripple websites confirm the concerns cybersecurity experts have long expressed about the threat posed by the internet of things (IoT). Many connected corporate devices, from VoIP phones and connected printers to smart video conferencing systems, have outdated firmware and can be hacked in minutes, according to new research from ForeScout Technologies. CIOs have spent the past two decades using firewalls, antivirus and anti-malware tools to build protective moats around servers and PCs. But it's what Abreu calls the "unusual suspects" that can wreak havoc. 

      Read Full Article
    8. Outsourcing in the age of cybersecurity concerns

      It’s only natural that security comes up when talking about software development. There’s no denying that poor software development practices and subsequent security issues can go hand in hand. The risks can be alarming. Access to an enterprise’s database can be embedded into code. There could be unknown backdoors and other vulnerabilities, allowing hackers to access customer information like usernames, passcodes, credit cards numbers or other sensitive data.

      Read Full Article
    9. Why cybersecurity spending will drive business digitization

      The days of CEOs regarding data protection technologies and staff as a budget drain and operating tax that stifles innovation are over. Galvanized by high-profile breaches, companies are shelling out more money to shore up corporate defenses. CEOs also recognize that security is table stakes for building digital products and are entrusting their CISOs with more responsibilities.

       

      Read Full Article
    10. Turn data from risk liability into an asset

      Big data has proven to be a big asset for corporations who are trying to collect information and make informed business decisions, but if the proper strategies for protecting that data are not in place, the risks to the enterprise can be costly. Earlier this year Cisco reported that worldwide mobile traffic is expected to grow eightfold from 2015 to 2020 reaching 30.6 exabytes, monthly.

      Read Full Article
    11. How to keep terrifying medical device hacks from becoming reality

      While some of the scariest IoT hacks envisioned – those involving hijacked medical devices such as pacemakers and insulin pumps – have yet to surface in the real world, those in the medical and IT security fields are not letting down their guard. They’ve seen enough ransomware and other attacks on healthcare outfits of late to know they are major cyberattack targets.

      Read Full Article
    12. Industrial IoT inches toward consensus on security

      IoT is complex, fast-growing and often intertwined with systems that govern things like water and power. That makes IoT security a critical requirement, but it’s one that’s not necessarily well understood.The Industrial Internet Consortium, a group that includes some of the biggest players in the internet of things, took action on Monday to clear the air. It rolled out the IISF (Industrial Internet Security Framework), a set of best practices to help developers and users assess risks and defend against them.

      Read Full Article
    13. Oracle will acquire cloud security vendor Palerra

      Oracle has agreed to acquire Palerra, a vendor of software for securing cloud services, as part of its strategy to provide customers comprehensive identity and security cloud services

      Palerra offers a Cloud Access Security Broker product called Loric that offers a combination of visibility into cloud usage, data security, user behavior analytics, and security configuration, with automated incident responses.

      Read Full Article
    14. Chrome OS gets cryptographically verified enterprise device management

      Companies will now be able to cryptographically validate the identity of Chrome OS devices connecting to their networks and verify that those devices conform to their security policies. Google on Thursday announced a new feature and administration API called Verified Access. The API relies on digital certificates stored in the hardware-based Trusted Platform Modules (TPMs) present in every Chrome OS device to certify that the security state of those devices has not been altered.

      Read Full Article
    15. Chase Mobile grasps the obvious about biometrics

      With little fanfare, JPMorgan Chase on Monday (Sept. 12) reversed its security position on its mobile app, removing the need to type in a password once a customer has already been authenticated by either Apple's Touch ID or an Android biometric scan. Before Monday, Chase customers could log in using a biometric scan and see things such as balances but needed to authenticate themselves again with a password for transferring funds or making a payment.

      Read Full Article
    16. Mobile device use feeds card fraud in Asean region

      Card fraud rates are on the rise in Association of Southeast Asian Nations (Asean), mirroring a global trend, a study has found. Users of smartphones and tablets in the region need to be educated on security.There was a clear correlation between risky consumer behaviour and fraud, with the overall risk of fraud rising due to a global increase in smartphone and tablet use.

      Read Full Article
    17. FTC v. Wyndham and corporate cybersecurity

      The case of FTC v. Wyndham is one of the most important security and privacy cases decided in the last 10 years. The case affirms several important principles governing data security, and it is a must-read for business executives and attorneys. First, it cements the FTC’s authority to act as the nation’s privacy and security watchdog. Second, it identified a laundry list of privacy and security missteps.

      Read Full Article
    18. Social media, the gateway for malware

      Easy to access, widely used, and outside of enterprise control, social media sites are gold mines for malicious actors. People share a lot of seemingly innocuous information, which is exactly the kind of data that hackers love to collect and use in phishing or spear phishing campaigns. A recent NopSec 2016 State of Vulnerability Risk Management Report found that organizations use inadequate risk evaluation scoring systems. The report claimed that social media -- which often isn't included in any risk evaluation system -- is now a top platform for cybersecurity.

      Read Full Article
    25-48 of 147 « 1 2 3 4 5 6 7 »
  1. Popular Articles