Security
The Implications of Bring Your Own Identity
When I was seventeen, I played one of the greatest roles of my like: 'Mark Jannell'. A younger student who we’ll call 'Tim' (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to tell him. I stepped away from the lunch table for a few minutes, and as I headed back, a different friend intercepted me. By Mike Kiser, Senior Ident...
Securing OT systems against cyber-attack
With Smart Manufacturing continuing to merge the worlds of information technology (IT) and operational technology (OT), the demand for comprehensive security measures to protect OT networks is growing. For a standards-based approach, stakeholders can turn to the IEC 62443 guidelines.
Regulatory impasse within the web-scraping industry
The controversial intervention of consulting firm Cambridge Analytica in the 2016 US elections sparked a spate of heightened scrutiny in the web-scraping industry. The firm was accused of harvesting raw data from over 87 million Facebook users. The firm allegedly used the data to provide analytical assistance to the 2016 presidential campaign of President Donald Trump. Although no criminal convictions were made, the scandal sparked...
Nixu strengthens security awareness services
European cybersecurity company Nixu has started a co-operation with KnowBe4 solution, in order to train company employees continuously to identify phishing and social engineering. Over third of all cyber-attacks involve internal actors, and over third included social engineering. Many breaches result from inadequate security hygiene and a lack of attention to detail.
Fingerprint cards for next-generation biometric payments
As a second step in their announced partnership, Fingerprint Cards AB (Fingerprints) has entered into a commercial agreement (MoU) with STMicroelectronics to bring the joint platform to market. The platform improves the efficiency of the key features a of biometric system-on-card, demonstrating simple user enrolment, very high end-to-end banking transactions and matching performances.
Over half of UK businesses fall victim to cyber attacks
The utilities sector is under increasing threat from ransomware cyber attacks. More than half (53%) of IT decision makers in the sector admit that their business has been targeted by at least one cyber security attack over the last 12 months, according to new research from Veritas Technologies, a global leader in data protection, availability and insights.
One in five data breaches caused by misconfigured clouds
To accommodate remote work and improve efficiency, 85% of IT organisations are considering or already using the public cloud. However, with some of their most crucial data still located within the corporate perimeter, NetOps must come up with new ways to achieve seamless integration. While the transition to the cloud itself is tricky, protecting the assets inside it is a different problem.
Leaking data: the worrying new trend in ransomware
Until now, typically the worst threat that manufacturers faced from ransomware was the inconvenience of downtime and lost production while the company worked to get its systems back online using backups. Cyber-attackers played a numbers game, relying on a small number of victims to pay the ransom. However, a new trend sees attackers leak the sensitive data if victims don’t pay. Here Neil Ballinger, Head of EMEA sales at EU Automation, has e...
Is your smartphone spying on you?
Your phone is listening and helping marketers to target you. What can you do about it? Last year, there was a fiver percent increase in the installation of monitoring apps, a study by NordVPN shows. Yet some users suspect that their smartphones are spying on them even if they have no monitoring apps installed.
Online extortion gains traction among cyber criminals
Data-stealing ransomware attacks, online extortion, information harvesting malware, and supply chain attacks are among the critical threats to organisations highlighted in an attack landscape update published by cyber security provider F-Secure.