Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.
As prices of cryptocurrencies continue to skyrocket, fraudulent cryptocurrency scams are on the rise. Twitter cryptocurrency scams impersonating celebrities or influencers are so popular with cryptocurrency thieves and hackers simply because they are so easy to pull off on a daily basis.
The only guarantee today is that nefarious parties will continue to find new ways to infiltrate networks at financial institutions. Therefore, we must implement best practices to protect against cybersecurity incidents, as well as to resolve all possible issues that can arise should a cyberattack occur.
When consumers shop online many do not realize that they are not only handing over their hard-earned cash, there’s another transaction that is happening at the same time – online behavioral tracking. Data about you is being gathered, shared and analyzed to determine what you see and to shape your online experience.
Law enforcement agencies around the world are embracing new predictive policing technology that will help them spot criminals before a crime ever takes place. However, communities often have little or no idea of why or how this technology is being used, and that raises some important privacy and human rights concerns.
The bubble in cyber security jobs is encouraging people to look for better opportunities at exactly the wrong time, and that may lead to the detriment of the fight against cyber crime. A new report by (ISC)2 found that a staggering 84% of cyber workers are open to new opportunities or plan to change employers in 2018.
Legal research software provides fundamental support for the privacy office. Armed with up-to-the-minute knowledge, and a thorough understanding of current legal requirements, the privacy office can advise on compliance with privacy obligations across multiple jurisdictions. How do you choose the right solution?
Because of the significant damage a DDoS attack can cause, many IT teams will put protecting against the threat high on their agenda. However, what many IT teams may be completely unaware of is that there are a wide variety of different types of DDoS attack vectors in a cybercriminals’ arsenal.
Don’t wait for cybercrime to find you - remember that the best defense is always a good offense. Be a cybersecurity rock star. Just like any musician, you’ll have your big hits and your flops. But when you can see where you're going, with the right visibility into your systems, you will be TCB, takin’ care of business.
Crypto mining malware is now the weapon of choice for hackers worldwide. The skyrocketing prices of cryptocurrencies is driving the scale of cryptojacking attacks, and can mean very lucrative profits ranging from hundreds of dollars to twenty thousand dollars per month. Victims now include Tesla and the UK government.
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.