Cyber Security
Cyber security standards for enterprise-grade mobile apps
The not-for profit membership organisation Secure Chorus has announced the completion of its first set of interoperability standards for regulatory-compliant encrypted voice calls. The move will lead the way to the commercial rollout of an ecosystem of different brand mobile apps for enterprise.
Poor security practice from producers of connected products
What happens when someone discovers a security issue in a connected product? How do security researchers and others report a security issue? To gain better visibility into the current status of vulnerability disclosure practice in consumer companies providing connected products, the IoT Security Foundation (IoTSF) commissioned a research study.
A major update to the IoT Security Compliance Framework
The IoT Security Foundation (IoTSF) has announced ‘Release 2’ of its IoT Security Compliance Framework, following user feedback of the previous release. A significant enhancement is a move to a risk-based approach that gives the Framework more flexibility and greater applicability beyond earlier versions, which were aimed at consumer-grade products.
Enhancing security to support future growth
International professional services provider, Equiom has selected cyber security and GRC specialist, SureCloud to identify vulnerabilities in the company’s IT Infrastructure and provide recommendations and training for improving its security posture. SureCloud is delivering all services as part of its Pentest-as-a-Service platform.
Endpoint security market worth over $7.5bn by 2024
The Endpoint Security Market growth is attributed to the rise in the incidents of massive cyber attacks on government and private IT networks around the world, potentially threatening national security and the privacy of critical public information. Due to frequent cyber-attacks, such as Shadow Brokers, WannaCry, and Petya, government and private organisations are increasingly deploying security solutions to protect their IT infrastructure.
Making security and compliance accessible to all enterprises
SailPoint Technologies has unveiled a series of new innovations in IdentityNow, the industry’s most comprehensive SaaS identity governance platform. Enhancements have been made with an eye towards both closing security and compliance gaps and simplifying identity implementations for organisations who may not have dedicated identity teams and resources.
Infrastructure: the greatest cyber attack vulnerability
The number of cyber attacks targeting critical infrastructures increased from 245 episodes in 2014 to 295 episodes in 2015, or 20% year over year.
Cyber-security in the emerging digital world
It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture. However, as we move along the road towards Smart Manufacturing with a view to improving efficiency, productivity and reliability of supply using the principles of Industry 4.0 and the Industrial Internet of Things (IIoT), the subject of cyber-security is becomin...
Dangerous consequences of compromising security of tech devices
Canada has just joined the other Five Eyes allies – Australia, New Zealand, the UK, and the US – in a renewed call to create backdoors into private citizens’ information. The Five Eye countries demand that technology companies cooperate with law enforcement agencies to allow access to encrypted and private communications, including Facebook and text messages.
Survey reveals cyber security habits are getting worse
The results of the 10th Annual Market Pulse Survey from SailPoint Technologies, expose an alarming trend: despite an increased focus on cyber security awareness in the workplace, employees’ poor cyber security habits are getting worse, compounded by the speed and complexity of the digital transformation.