What is digital trust? How CSOs can help drive business
Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.
View ArticleWhat are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors
Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.
View ArticleWhat is a man-in-the-middle attack? How MitM attacks work and how to prevent...
A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is...
View ArticleRansomware attack drives city to seek greater network visibility into cyber...
After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter.
View ArticleAPT group Elfin switches from data destruction to data stealing via WinRAR...
Iranian-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.
View ArticleNew TajMahal APT discovered by Kaspersky with an unknown number of victims
Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.
View ArticleWipro breach highlights third-party risk from large IT services providers
After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk.
View ArticleTelcos around the world hit by long-term intelligence gathering cyberattack
Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.
View ArticleThe biggest data breach fines, penalties and settlements so far
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting.
View ArticleChina’s MLPS 2.0: Data grab or legitimate attempt to improve domestic...
The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China...
View ArticleHow much does it cost to launch a cyber attack?
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about.
View Article7 security incidents that cost CISOs their jobs
Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.
View ArticleWhat the Brexit Withdrawal Agreement Bill means for data protection and the GDPR
Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.
View Article
More Pages to Explore .....