Thanks to some unsecured public-facing databases, Verifications.io email data breach has set a new record for leaking 2 billion personal records which can be useful for identity theft and scams.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
European Court of Auditors recently released a comprehensive report detailing the cybersecurity challenges facing the European Union in 2019 and beyond, and how best to respond to the growing number of cyber threats.
Since 5G is not simply a faster version of 4G, but rather, an entirely new network architecture, it opens the door to entirely new security models for user privacy, identity management, and threat detection.
In just a few years, cyber extortion has gone from a fringe hacking activity to something that is now very much mainstream. In fact, it’s now possible for hackers to make upwards of $360,000 per year by joining a cyber extortion team.
Automation is no longer an office-only reality. How can we ensure security when inviting automation into our homes? Should we be auditing smart home technology in the same way we audit our office automation?
Huawei hits back at the United States after it's PR charm offensive including opening up it's source code went nowhere. It reminded the world of the biggest scandal of the century – the PRISM program and Five Eyes surveillance.
As organizations realize that there is no such of a thing as being “fully protected” from a cyberattack, what are the tactices and steps to improve and get an edge in the cyber security arms race?
Insurers have a vital role to play in inoculating organizations against potentially crippling attacks. With cyber insurance premiums forecast to reach $7.5 billion by 2020, how can insurers do their part to leverage this opportunity for the benefit of customers in today’s digital world?
Citrix is the latest big name to fall victim to a major data breach. The data breach is thought to have been perpetrated by Iranian hackers in a group called IRIDIUM, which is believed to have ties to the country's government.
What kind of future can be achieved by focusing on the nexus of information security and data privacy? Better compliance, stronger alignment and greater accountability, just to name a few benefits.