Chinese hackers have just pulled off one of India’s biggest cyber fraud ever by convinceing the head of a local Indian subsidiary of an Italian firm to wire $18.6 million from bank accounts in India to a bank account in Hong Kong.
What some are calling ‘Industrie 4.0’ or the Smart Factory has become a reality, and has accelerated the digital transformation in the industrial sector. This increased reliance on digital systems has led to an increased emphasis on industrial control systems (ICS) security in the manufacturing sector.
Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
Insurers have a vital role to play in inoculating organizations against potentially crippling attacks. With cyber insurance premiums forecast to reach $7.5 billion by 2020, how can insurers do their part to leverage this opportunity for the benefit of customers in today’s digital world?
Mobile smartphone usage is now reaching saturation point in the developed world. Increasingly mobile phones are becoming (or have become) indispensable business tools as well as powerful communication devices. However, with great power comes great responsibility – something that seems to have escaped U.S. President Donald Trump who is still using a legacy Android device. In this article we examine just why mobile devices present massive challenges when it comes to data security – and why business users need to be vigilant.
A fundamental shift from defensive to offensive cyber operations is now underway in order to deter cyber attacks, and the United States and its European ally France are at the forefront of this trend.
There is still an elevated threat of serious Iranian cyber attacks on US targets even as the potential for an all-out war seems to have simmered down for the moment as Iran is known to act through asymmetric warfare.
Bloomberg reported that Chinese spies planted a grain-sized microchip in motherboards supplied to server manufacturers in an alleged supply chain attack. What are the lessons for enterprises?
With the aid of technology, insider fraud has outranked all other forms of fraud for modern businesses, ironically the companies are also using it to pre-emptively stop fraudsters in their tracks.