Bad habits creeping into cyber security
Over a third (36%) of employees say they have picked up bad cyber security behaviours and found security ‘workarounds’ since working remotely, according to a new report from Tessian, the human layer security company.
City of York cloud data sees new security solution
City of York Council has engaged the help of Barracuda Networks to help protect its Office 365 data with the security firm’s flagship product, Cloud-to-Cloud Backup. The City of York Council in Yorkshire, England, is the unitary authority responsible for allocating resources and delivering services to the more than 210,000 residents of the City of York. For Infrastructure Services Technical Lead, Ian Towner, that responsibili...
ETSI Open Source MANO launches Release TEN, celebrates OSM 5th anniversary
ETSI has introduced OSM Release TEN, the 11th Release of an Open-Source project which first announced its Release ZERO in 2016 with the vision of closing the gap between the traditional way of building telecom networks, and the use of cloud technologies in telcos emerging at that time.
The role of electronics manufacturers in device security
Cyber threats and attacks are a stark reality for everyone in today’s world, from organisations and manufacturers to individuals. The problem also reaches every industry, including healthcare, logistics, retail, and manufacturing. Electronics and technology writer, Devin Partida explains the role of device security.
Build a secure supply chain for asset management with ease
Security is a vital component of any system that requires the active management of asset management used in the field. Operators need to be sure that the information they have on assets in the field is valid and has not been tampered with. If not, they face risks to their business model and ability to service users properly. Sree Durbha, Director of LoRa Edge Product Management in Semtech’s Wireless and Sensing Products Group, explains.
Access management failures put organisations at risk
A proper user access management strategy can be the difference between protected data and exposed data. In the current climate, flexible remote work has become the norm — with that, the risk surrounding data integrity is rapidly increasing.
The Implications of Bring Your Own Identity
When I was seventeen, I played one of the greatest roles of my like: 'Mark Jannell'. A younger student who we’ll call 'Tim' (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to tell him. I stepped away from the lunch table for a few minutes, and as I headed back, a different friend intercepted me. By Mike Kiser, Senior Ident...
Securing OT systems against cyber-attack
With Smart Manufacturing continuing to merge the worlds of information technology (IT) and operational technology (OT), the demand for comprehensive security measures to protect OT networks is growing. For a standards-based approach, stakeholders can turn to the IEC 62443 guidelines.
Regulatory impasse within the web-scraping industry
The controversial intervention of consulting firm Cambridge Analytica in the 2016 US elections sparked a spate of heightened scrutiny in the web-scraping industry. The firm was accused of harvesting raw data from over 87 million Facebook users. The firm allegedly used the data to provide analytical assistance to the 2016 presidential campaign of President Donald Trump. Although no criminal convictions were made, the scandal sparked...
Nixu strengthens security awareness services
European cybersecurity company Nixu has started a co-operation with KnowBe4 solution, in order to train company employees continuously to identify phishing and social engineering. Over third of all cyber-attacks involve internal actors, and over third included social engineering. Many breaches result from inadequate security hygiene and a lack of attention to detail.