Please turn on your JavaScript for this page to function normally.
car swerving hacking
Don’t take your hands off the wheel

Let me tell you a story. It’s a story about my brother-in-law, whom, for the sake of decency, we’ll call Steve. Steve has a new car. He loves that new car. It’s great. Does …

skull
Why companies shouldn’t feel helpless in the fight against ransomware

According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; human behaviour …

alert
Six best practices for managing cyber alerts

Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

shield
Is it time to call an MSSP? Five signs that it can’t wait

Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …

danger
Analysis of new Shamoon infections

All of the initial analysis pointed to Shamoon emerging in the Middle East. This however was not the end of the story since the campaign continues to target organizations in …

Jupyter Notebook
Jupyter Notebook unwittingly opens huge server security hole

Jupyter Notebook has become a reliable tool for individuals to learn new programming languages, build proof-of-concept tools and analyze data. However, there are severe …

gap
Real-time network health management: Closing the gap between known and unknown threats

2016 was yet another record year for cyber security threats. As of July 2016, there were 522 reported breaches, exposing more than 13 million records, according to the …

industry
Effective ICS cyber defense methods

Cyber defense risks are on the top of concern for every manager operating manufacturing and critical infrastructure. The solutions for protecting the Confidentiality, …

bridge
Security management outlook: Five trends to watch

Cybersecurity can’t sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five …

In 2017, the digital will get physical when machines start to lie

In a memorable scene from a 2014 episode of the series Homeland, the Vice President is murdered by hackers who tamper with his pacemaker. Despite this plot idea reportedly …

Redefining the role of security in software development

Software is becoming increasingly important for market success, driving an ever greater need for speed in the development process. The rapid adoption of DevOps is testimony to …

smart toys
The gift that keeps giving away your data

If you unwrapped a shiny, new connected device this holiday season, it’s likely that you’re in the honeymoon stage, reaping many benefits from your new device. However, this …

Don't miss

Cybersecurity news