Resilience in the era of cyber attacks
When most of us think about national security, thought immediately goes to more conventional threats in the form of physical attacks on territory. Few consider the ‘behind the screens’ cyber power battles that can take down entire networks that governments, organisations and citizens rely on for protection and survival. By Roger Sels, VP Solutions at BlackBerry
Multi-cloud environments pose greater security challenges
Tripwire has announced the results of a new research report that evaluated cloud security practices across enterprise environments in 2021. Conducted for Tripwire by Dimensional Research last month, the survey evaluated the opinions of 314 security professionals with direct responsibility for the security of public cloud infrastructure within their organisation.
National Cyber Security Coordinator of India to address IAMAI’s Pursuit 2021
Lt General (Dr) Rajesh Pant, the National Cyber Security Coordinator of India, has announced that he will be addressing Pursuit 2021, a conference to technologically reduce online financial frauds. Pursuit 2021 is being organised by the Internet and Mobile Association of India (IAMAI) and is likely to be attended by 2000 delegates.
Water plant cyber attack shows industrial vulnerability
In early February 2021, the control system of the water utility in Oldsmar, USA, fell victim to an external tampering cyber attack. According to the utility's supervisor, a hacker gained access to the central control system around 1:30pm on February 5th. The hacker took control of the screen and increased the addition of sodium hydroxide (also known as lye) by a factor of hundreds. The chemical is used in water treatment to regulate the acidity o...
Bad habits creeping into cyber security
Over a third (36%) of employees say they have picked up bad cyber security behaviours and found security ‘workarounds’ since working remotely, according to a new report from Tessian, the human layer security company.
City of York cloud data sees new security solution
City of York Council has engaged the help of Barracuda Networks to help protect its Office 365 data with the security firm’s flagship product, Cloud-to-Cloud Backup. The City of York Council in Yorkshire, England, is the unitary authority responsible for allocating resources and delivering services to the more than 210,000 residents of the City of York. For Infrastructure Services Technical Lead, Ian Towner, that responsibili...
ETSI Open Source MANO launches Release TEN, celebrates OSM 5th anniversary
ETSI has introduced OSM Release TEN, the 11th Release of an Open-Source project which first announced its Release ZERO in 2016 with the vision of closing the gap between the traditional way of building telecom networks, and the use of cloud technologies in telcos emerging at that time.
The role of electronics manufacturers in device security
Cyber threats and attacks are a stark reality for everyone in today’s world, from organisations and manufacturers to individuals. The problem also reaches every industry, including healthcare, logistics, retail, and manufacturing. Electronics and technology writer, Devin Partida explains the role of device security.
Build a secure supply chain for asset management with ease
Security is a vital component of any system that requires the active management of asset management used in the field. Operators need to be sure that the information they have on assets in the field is valid and has not been tampered with. If not, they face risks to their business model and ability to service users properly. Sree Durbha, Director of LoRa Edge Product Management in Semtech’s Wireless and Sensing Products Group, explains.
Access management failures put organisations at risk
A proper user access management strategy can be the difference between protected data and exposed data. In the current climate, flexible remote work has become the norm — with that, the risk surrounding data integrity is rapidly increasing.