Protecting Generation Z from cyber unrest

2017 saw a 140% increase in IoT botnet infections from 2016, and those numbers are expected to increase. To anyone who regularly uses Internet-connected services, says Yossi Atias, GM IoT Security at BullGuard,

Read more

Intelligent sound analysis for hydropower plants with Voith OnCare.Acoustic

With OnCare.Acoustic (formerly known as HyGuard), Voith supports hydropower plant operators in discovering potentially dangerous incidents by detecting sound anomalies, classifying them into warnings and alarms as well as allocating them to specific equipment, which enables the derivation of information for smarter recommendations and decisions with regard to maintenance and operations.

Read more

TÜV Rheinland launches global industrial Cybersecurity Centre of Excellence in Kuala Lumpur

TÜV Rheinland has launched its global Industrial Cybersecurity Centre of Excellence (CoE) based in Kuala Lumpur, Malaysia. The Centre of Excellence will address the cybersecurity needs of its industrial clients such as manufacturing companies, plant operators, energy and utility companies, transportation and transit system operators to secure their operational technology landscape.

Read more

One third of execs would pay hacker’s ransom demands instead of investing in security, report reveals

One third of global business decision makers report that their organisation would try to cut costs by considering paying a ransom demand from a hacker rather than invest in information security. In the UK, this figure drops to a fifth (21%) of respondents.

Read more

Centrify announces new analytics service app for the Palo Alto Networks Application Framework

Centrify, a provider of Zero Trust Security through the power of Next-Gen Access, unveiled its analytics service app for the Palo Alto Networks® Application Framework. Combining Centrify’s Analytics Service with the capabilities of the Palo Alto Networks Security Operating Platform strengthens Zero Trust Security 

Read more

More than one-third of companies employ managed security services to hunt cyber threats

Alert Logic, the provider of Security-as-a-Service solutions, announced data from Crowd Research Partners’ 2018 Threat Hunting Report that shows 84% of companies agree that threat hunting should be a top security initiative, yet 76% believe their Security Operations Centres (SOCs)

Read more

Automotive cybersecurity for connected cars

While addressing cybersecurity threats has become common practice for consumer devices such as personal computers and smart phones, cybersecurity for connected vehicles with rapidly evolving technologies and more complex attack surfaces is still going through the process of being studied and fully understood.

Read more

70% of energy security professionals concerned about ‘catastrophic failure’ from Cyberthreats, finds Tripwire

Tripwire, Inc., a global provider of security and compliance solutions for enterprises and industrial organisations, today announced the results of a survey conducted by Dimensional Research examining industrial control systems (ICS) security in the energy industry.

Read more

Steel giant and gas industry partner with anomaly detection firm to protect control systems from malfunctions and cyberattacks

Rhebo supports automation companies and critical infrastructures in ensuring process continuity and cyber security in their industrial control systems (ICS) as well as network control technology. In its second financing round, the Leipzig-based technology company, founded in 2014,

Read more

Orange Cyberdefense launches new mobile decontamination terminal for USB flash drives

USB flash drives, whether they are new or used, are major sources of infection for company IT systems. They are in widespread use, particularly in certain sectors such as in industry, education and healthcare, both for sharing documents and for updating software.

Read more

The security challenge posed by the Internet of Things: Part 2

In part one of this series, we outlined the three tiers of the IoT security architecture and three key security challenges IoT devices pose. Now we will move on to explore three specific examples of the security challenges IoT deployments can pose and underline the importance of thinking strategically to head off IoT security threats, says GH

Read more

The security challenge posed by the Internet of Things: Part 1

Many organisations are experimenting with IoT projects, but these bring in significantly different security challenges, which can have far-reaching consequences. An appreciation of these unique challenges is important for the effective rollout of IoT.

Read more

Digital transformation and IoT to drive cybersecurity spend to $134bn annually by 2022, says Juniper Research

New data from Juniper Research has found that global business spend on cybersecurity solutions will grow by 33% over the next 4 years, reaching $134 billion (€108.08 billion) annually by 2022.

Read more

Axis launches new software for easy on-site device management and proactive cybersecurity control

Axis Communications has announced the release of AXIS Device Manager, a comprehensive on-premise device management tool that offers an easy, cost-effective and secure way to manage all major installation and operational device management tasks.

Read more

Business fears: The need for better security in the Internet of Things

Cybersecurity in business is often overlooked, underfunded or simply not given enough thought. Though recent research by Avast Business found that 96% of SMBs are concerned about malware and ransomware, the ‘it won’t happen to us’ attitude is still just as prevalent as the underlying fear of being hacked.

Read more

Free ‘GDPR Readiness’ tool launched to help businesses comply with impending EU legislation

NW Security Group, a provider of IP video solutions and security consultancy, has launched a free General Data Protection Regulation (GDPR) Readiness checklist tool to help businesses quickly and easily determine if they’re adequately preparing for the new legislation.

Read more