Three strategies CISOs should take to minimise IoT risks following Verkada

In early March, a Swiss hacktivist by the name of Tillie Kottman successfully exposed businesses, police departments, schools, jails and hospitals in one of the most widespread cyber attacks in modern history, says Chris Rouland, founder and CEO of Phosphorus. How did they do it?

Read more

Major cyber security gaps remain after a year of remote work, research shows

The majority of organisations (57%) still have over three-quarters of their teams working remotely, according to a new report. An overwhelming 90% of organisations said they are likely to continue these increased levels of remote work in the future due to productivity benefits.

Read more

Phishing attacks increase 718% in Europe, says Allot research

Allot Ltd., a global provider of network intelligence and security solutions for service providers and enterprises worldwide, has released its 2020 Europe Cyber Threat Report.

Read more

The cybersecurity lessons from 2020

The breach of SolarWinds and its Orion Platform software  captivated our collective attention in the final weeks of 2020. While arguably it was, and continues to be, considered the most significant event of the year, it is not the attack path most organisations should fear.

Read more

The IIoT journey starts with remote telemetry

The first rule of supervisory control and data acquisition (SCADA) is that communications will fail. One challenge is rising volumes of data place increasing loads on both the main server and the communications networks connected to it.

Read more

Port53 launches an engagement platform to empower technology stakeholders

Port53 Technologies, a customer-centric cloud security, announced the launch of a platform that will empower cybersecurity professionals to shape their organisations’ threat postures at will.

Read more

Protection for cloud-based applications from Trend Micro

Trend Micro Incorporated, the provider in cloud security, announced the availability of its Trend Micro Cloud One Application Security, a cloud native security solution for modern applications and APIs. Delivered as part of its platform, Cloud One Application Security provides code-level visibility and protection against the latest cyber threats.

Read more

Convenience or corruption? USB media and cybersecurity risk

From hard drives and flash drives to a wide range of other devices, USB media offers a fast, simple way to transport, share and store data when digital transfer isn’t possible.

Read more

What is device attestation?

As an organisation that is founded on the expertise and insights of our members, we have taken the opportunity to discuss some of the new and emerging technologies shaping our industries, and how GlobalPlatform is working to define standards that enable digital devices and services to be securely brought to market.

Read more

Network visibility now top concern for NetOps and SecOps as remote work surges

The 13th annual State of the Network global study of enterprise networking and security challenges shows that IT teams critically require better visibility into the network. The report has been released today by VIAVI Solutions, Inc.

Read more

Exploring IoT’s top five challenges through the 5 Cs – Part 2

In the part 1 of the blog, we discussed about one of the top five challenges through the 5Cs. In the second part of the blog we will be discussing about continuity, compliance, coexistence and cybersecurity.

Read more

Cybersecurity index shows the most exposed countries: Afghanistan tops the list

The new Cybersecurity Exposure Index (CEI) by password security resource PasswordManagers.co, reveals which countries are the most and least exposed to cybercrime.

Read more

IoT is transforming the enterprise: Find out how your peers are doing it

The Internet of Things (IoT) is becoming a key element of digital transformation for enterprises around the world. But companies across industries and time zones face challenges that keep them from achieving their goals and realising IoT’s maximum value, says Bill Hurley, chief marketing officer of Syniverse.

Read more

Safeguarding Industrial IoT: A rising security challenge – Part 1

The Fourth industrial revolution has unleashed a myriad of opportunities for organisations eager to leverage a new generation of connected Industrial Internet of Things (IIoT) devices and reap the rewards of enhanced data sharing, operational efficiencies, and productivity, says Trevor Daughney, vice president of product marketing at Exabeam

Read more

Will 2020 be the year home IoT cyber attacks get serious?

When it comes to disruptive change, the emergence of the smart home is driving demographic, economic, and technological advancement as never before, says David P. Maher, executive VP and chief technology officer of Intertrust. This application of IoT, where private households and the devices that run them are connected to the internet, is creating an

Read more

Global survey shows IoT security precautions failing and companies underestimate insider threats

New data from Extreme Networks Inc., a cloud-driven networking company, reveals that the Internet of Things (IoT) is “barrelling toward the enterprise, but organisations remain highly vulnerable to IoT-based attacks”.

Read more