Organizations should be wary of the security risks posed by AR technology with growth in usage for lowering operational costs, increasing productivity and streamlining processes.
Russia has been making news for hacking utility systems in other nations and for a change, news has emerged that U.S. is conducting cyber attack on power grid in Russia by planting malicious code.
The cyberattack on Colonial Pipeline was a big lesson. It is imperative that critical infrastructure companies uplevel their protection against modern security risks by using modern techniques and automation to comply with new cybersecurity regulations.
WEF2019 global risk report has named cyber attacks and data breaches as the fourth and fifth most serious risks facing the world, and will do more damage than man-made environmental disasters.
While many people are struck with fear, they also seem paralyzed as they look for what they can do about online threats, cyber crime and control over their data privacy.
Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
Blockchain can bring the world to a common consensus of “what exactly happened” when it comes to threat intelligence, reducing confusion and complication, and promoting trust in the information.
Increasing connectivity through 5G networks also comes with heightened cybersecurity threats, authorities need to build security regimes that protect not only 5G infrastructure and services, but the applications and IoT devices.
What some are calling ‘Industrie 4.0’ or the Smart Factory has become a reality, and has accelerated the digital transformation in the industrial sector. This increased reliance on digital systems has led to an increased emphasis on industrial control systems (ICS) security in the manufacturing sector.
Cryptojacking incidents are increasing faster than any other types of cyber incident with reports indicate that it has tripled since 2017. Why are cryptojacking rates on the rise and how do you recognize it?