Please turn on your JavaScript for this page to function normally.
skull
The rise of ransom hacks, and the potential impact on your business

The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by …

IoT
Internet of Things security issues bleed into 2018

In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the …

Gemalto - cloud adoption
As the cloud’s popularity grows, so does the risk to sensitive data

While the vast majority of global companies (95%) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different …

Waterfall ebook
eBook: 5 emerging rail cybersecurity standards

This eBook is no longer available. With massive capital investments in rail infrastructure and technology, many countries understand that it’s time cybersecurity standards …

hands
The role of trust in security: Building relationships with management and employees

Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest …

businessman
CISOs are feeling less confident than ever about cyber risk and data security

Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in …

Visa
On-card biometric for contactless payments tested in first commercial pilots

Visa has initiated pilots with Mountain America Credit Union and Bank of Cyprus of a new EMV dual-interface (chip- and contactless-enabled) payment card, making these the …

abstract broken connections
Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection

Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs …

F-Secure Intel AMT
Intel AMT security issue gives attackers complete control over a laptop

F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows …

healthcare professionals
One in five healthcare pros have experienced patient data breaches

According to a recent University of Phoenix College of Health Professions online survey of 504 registered nurses and administrative staff, only a quarter of registered nurses …

bulb
Strong security simplifies compliance for French operators of vital industry

In 2014, France’s National Agency for the Security of Information Systems, or ANSSI, issued two detailed cybersecurity guidance documents for Industrial Control Systems: …

Embedi IOActive research
Researchers uncover major security vulnerabilities in ICS mobile applications

IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …

Don't miss

Cybersecurity news