1. Articles in category: Cyber Security

    73-96 of 147 « 1 2 3 4 5 6 7 »
    1. Hacker Lexicon: What Is Full Disk Encryption?

      There's been a lot of talk in recent years about encryption and what the FBI terms its “Going Dark” problem—its inability to read the communications of surveillance targets because more and more data is being encrypted. And while the end-to-end messaging encryption that protects data in transit in apps like WhatsApp get a lot of press, it’s a problem that applies equally a data at rest. The kind that full-disk encryption is designed to protect.

      Read Full Article
    2. Hackers are coming for your healthcare records -- here’s why

      Data stolen from a bank quickly becomes useless once the breach is discovered and passcodes are changed. But data from the healthcare industry, which includes both personal identities and medical histories, can live a lifetime. Cyberattacks will cost hospitals more than $305 billion over the next five years and one in 13 patients will have their data compromised by a hack, according to industry consultancy Accenture.

      Read Full Article
    3. Boost your security: Get IT and HR to collaborate

      Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources. It is essential for companies to have control both at the data level and endpoint level and with it an improvement of policies overall.

      Read Full Article
    4. 4 Ways Gamification Is Advancing Cybersecurity

      With internet-based services encroaching over every aspect of our lives and tasks, new vulnerabilities are sprouting every day, providing malicious actors with new possibilities. One method helping immensely in overcoming these problems is the use of gamification, which employs gaming mechanics to deal with non-gaming situations. The use of gaming concepts is helping in many ways break the complexity of cybersecurity tasks and create motivation for collective efforts to deal with the rising challenges.

       

      Read Full Article
    5. Shadow data and the risks posed by cloud storage and apps

      Shadow IT is the deployment and use of systems and applications without the knowledge or explicit consent of an organisation’s IT department. These days, that typically means cloud or software-as-a-service (SaaS) applications. Cloud storage and apps can open up an organisation to risks of data leakage. This article looks at key areas of vulnerability and what you can do to prevent your data going viral

      Read Full Article
    6. Cyber insurance is changing the way we look at risk

      Forms of cyber insurance policies have been around for the past 10 years, market awareness has recently increased exponentially, in part because of the headline-grabbing cyber breaches that have hit almost every industry. One thing is certain, the way we look at risk is evolving and cyber insurance has a role to play in a company’s overall risk mitigation strategies. The extent to which it will enable us to better assess and ultimately combat the rising threat landscape we are facing is still to be seen.

      Read Full Article
    7. Human error biggest risk to health IT

      In the race to digitize the healthcare industry, providers, insurers and others in the multi-layered ecosystem have failed to take some of the most basic steps to protect consumers' sensitive health information. Too many healthcare breaches are the product of basic mistakes, ignorance or employee negligence. Nearly all past successful network penetrations can be traced to one or more human errors that allowed the adversary to gain access to and, in some cases, exploit mission-critical information.

      Read Full Article
    8. Debate continues over where CISOs sit in the C-suite

      Pundits scrutinizing senior executive dynamics have opined for years about to whom the CISO should report. Some say the CISO should report to only the CIO because the top security role is inextricably linked to IT. Others say this is a terrible idea because the CISO's must lock down the corporate network while the CIO is challenged to innovate. A CISO panel convened at the MIT Sloan CIO Symposium last month rekindled this longstanding C-suite debate.

      Read Full Article
    9. Exploding IoT attack surface not an immediate threat to business

      Although the cyber attack surface is exploding with the adoption of internet of things (IoT) devices and services, this is not yet an immediate threat to most businesses but it will be a threat in around five years' time. In preparation for IoT, companies should ensure they are patching their basic infrastructure, monitoring cloud applications and user bases, and developing secure mobile applications. 

      Read Full Article
    10. Are you buried under your security data?

      The lack of ability to process massive amount of security data probably contributes a great deal to the success of the pervasive security attacks many face. Before looking for new sources of data, it would be better to be able to use the data already present. To fully review all logs and reports manually, a typical midsize company would need a bunch of employees staring at data for eight hours a day, and such positions are hard to justify. Employing automation to dig through the massive pile of security data seems to be the way to go. 

      Read Full Article
    11. IT losing confidence in cybersecurity products, frustrated by impact on productivity

      IT's confidence in cybersecurity products is down, and concern regarding their impact on employee productivity is up. When it comes to measuring confidence in cybersecurity, half of respondents said they are not confident in their current security products. Almost 1 in 5 feel that effective endpoint security isn't even possible. The overwhelming majority (about 75 percent) feel "employees' cybersecurity awareness is moderate at best. One of the biggest issues is how security products seem to get in the way of productivity.

      Read Full Article
    12. Cybercriminals now target payroll, invoicing, and superannuation systems

      The cybercriminals attacking financial systems are smarter, more subtle, and better organised, and they're stealing unprecedented amounts of money. Cybercriminals are shifting their focus to second-tier targets such as payroll systems, invoicing systems, and superannuation brokers. Funds were often transferred through secondary money mules to further protect the criminals. Many of these secondary mules were older people and pensioners.

      Read Full Article
    13. One-fifth of IT pros say their companies had mobile data breach

      IT pros have long been concerned about the potential for security breaches with increased employee use of mobile devices, including smartphones and tablets owned by workers who bring in their own devices from home. A new survey of 882 IT professionals has quantified those concerns, revealing that one in five organizations (21%) suffered a security breach involving a mobile device sometime in the past, primarily due to connections to malicious Wi-Fi hotspots and malware.

      Read Full Article
    14. Where is my data? (And other terrifying questions facing security professionals)

      The lifeblood of any company is the sensitive data it processes. To be useful, this data needs to be connected to other applications, mashed-up with other data sources and presented to a wide variety of mobile users, business owners, and API endpoints. The top trends seem to be forcing organizations to invest in security remain the consumerization of IT.

      Read Full Article
    15. Microsoft adds new security enhancements to its cloud offerings

      Microsoft is adding a range of new security management and reporting features to its Office 365 and Azure cloud services as part of the company's holistic approach to enterprise security announced last year. In April, the company will release a new product called Microsoft Cloud App Security that will allow customers to gain better visibility, control and security for data hosted in cloud apps like Office 365, Box, SalesForce, ServiceNow and Ariba. The new product is based on technology from Adallom, a cloud access security broker Microsoft acquired in September.

      Read Full Article
    16. UK CIOs over-confident about cyber security, study shows

      UK firms are operating from a reactive security posture and tending to symptoms, rather than causes, and yet still believe they can detect threats faster than the industry average. More than a quarter of UK CIOs say they are not concerned about security breaches or the time needed to discover them, according to research. But 85% admit they are not proactively hunting for threats, and are dealing with them only when breaches are discovered.

      Read Full Article
    17. Why machine learning is not the silver-bullet solution to online fraud

      Machine learning has emerged as the best tool to fight fraud at scale, and merchants with the right instincts are increasingly turning to it for solutions. However, too many merchants are looking to machine learning as a panacea for fraud, and some vendors are irresponsibly fueling that belief, advocating a total replacement of seasoned fraud experts in favor of the machine. The truth is, when machine learning is naively and dogmatically applied, it will not only fall short of its potential, but it’s also likely to perform much worse than traditional fraud prevention techniques.

      Read Full Article
    18. Apple will not build a backdoor to the iPhone, says Tim Cook in response to FBI court order

      Apple CEO Tim Cook has responded to the court order that stipulated Apple must help the FBI break into a phone that belonged to one of the San Bernardino killers. “The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers,” said Cook. “We oppose this order, which has implications far beyond the legal case at hand.”

      Read Full Article
    19. DDoS is most common cyber attack on financial institutions

      A distributed denial of service (DDoS) attack on HSBC’s online banking services is not unusual or surprising, according to information security experts. With financial institutions underpinning whole economies, they are a choice vertical target for an impactful DDoS attack, said Richard Brown, European director for channels and alliances at Arbor Networks. The 2015 Verizon Data Breach Investigations Report (DBIR) shows that DDoS attacks are the most common form of attack against financial services businesses, accounting for 32% of all attacks analysed in the report. And Arbor Networks’ recent Worldwide Infrastructure Security Report found that 57% of financial institutions have ...

      Read Full Article
    73-96 of 147 « 1 2 3 4 5 6 7 »
  1. Popular Articles