Security
Protecting today’s corporate digital identity
Today we try to safeguard our digital identity as much as our wallet and its contents. Our personal digital identity authorises us to go about our day-to-day - logging into our bank account to pay bills, checking our Facebook page for notifications or scheduling an UberEats delivery for dinner - but then there is our professional digital identity. Written by Juliette Rizkallah, CMO, SailPoint
Essential cyber security training failing to be delivered
Almost a third (28%) of UK businesses offer no cyber security training to reduce the likelihood and severity of data breaches while working from home, a new study reveals. The Cyber Security Insights Report from managed cloud services and security provider iomart asked workers about their businesses’ cyber security provisions, including the level of training offered, the extent of data backup policies in place, and their awareness of how to...
Five cyber security training methods to try in 2021
As much as 88% of data breaches are caused by human error, but only 43% of workers admit having made mistakes that compromised cyber security. In the past year a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million.
IoT device security challenges
Joe Lomako, Business Development Manager (IoT) at TÜV SÜD, explains how to identify cyber weaknesses and mitigate against them.
How will cyber criminals utilise growing online sales?
PwC’s 2020 US Holiday Outlook indicates that 61% of those surveyed will do most of their shopping online, as 55% mentioned the pandemic being the biggest concern preparing for Christmas this year. Accenture provides similar estimations with 75% respondents claiming they would at least partially shop for Christmas online. E-commerce vendors aim to grow their profits due to increased traffic in online stores, but this puts them in ...
Don’t leave security to chance
Embedded security is now paramount. In a world where the adversaries have access to low-cost tools, seeking out vulnerabilities in your IoT device has become a routine event to improve security. In a remotely connected system, compromising a single target device gives the adversary potential access to the whole IoT deployment. By Mark Patrick, Mouser Electronics
Network attacks hit two-year high during pandemic
Network attacks and unique attack signatures both hit two-year highs between July and September this year, according to the latest Internet Security Report from WatchGuard Technologies. Findings from the research show that attacks detected grew to more than 3.3 million, representing a 90% increase over the previous quarter.
Blockchain to enhance supply chain resiliency
Desigual, an international fashion brand headquartered in Barcelona, has partnered with enterprise blockchain group, Finboot to integrate its MARCO Track & Trace application within its import and export process to improve transparency and build resiliency in its supply chain.
NEC supports cyber crime Investigation Training
NEC Corporation and Cyber Defense Institute have announced their support for the INTERPOL Digital Security Challenge (DSC), a virtual cyber crime investigation event that took place from October 12th to 16th. During the event, cyber crime investigation officers and experts in digital forensics from 50 countries came together to tackle a complex cyber crime scenario by exchanging knowledge and expertise.
Schools bombarded with spear-phishing attacks
More than 1,000 educational institutions, such as schools, colleges and universities, have been targeted by over 3.5 million spear-phishing attacks from June through to September 2020. This is according to new research from Barracuda Networks, the trusted partner and leading provider for cloud-enabled security solutions, released in their most recent ‘Threat Spotlight’.