As data protection breaches have become daily headline news and everyone becomes increasingly sensitive about privacy, the regulatory regime is getting tougher. Data protection laws in Europe are more important than ever before - especially as the enforcement deadline of the EU GDPR looms.
Organizations' lack of understanding of IoT's specific security requirements hinders its growth potential. An organization can only reap the promise of IoT's benefits if it thinks of the security element as a vital component of implementation.
Download this whitepaper and learn why:
Experiences with security...
The promise of IoT is astronomical - enabling companies across every industry to become a connected service business. But to achieve meaningful results, enterprises need to follow a clear checklist to ensure that all the components in their IoT infrastructure are secure.
Download this whitepaper and learn how your...
Cybercriminals are continuously introducing new, sophisticated financial malware and social engineering tactics to impersonate banking customers. So how can your financial institution let customers in while keeping fraudsters out?
Download this whitepaper and learn how to:
Reduce security costs through simplified...
Ransomware infections can be devastating, and recovery efforts threaten to financially cripple your organization. Prevention is the most effective defense.
Download this whitepaper and learn 14 ransomware defense best practices including how to:
Implement an awareness and training program;
Enable strong spam...
Open banking has completely transformed banking and customers' expectations. However, just as the open banking era makes business easier for customers, it also enables new opportunities for fraudsters.
Download this whitepaper and learn:
What open banking means for institutions, customers and fraudsters;
The U.S. government has charged three employees of Chinese cybersecurity firm Boysec with stealing valuable intellectual property from Siemens, Moody's Analytics and Trimble. Security researchers say Boysec has been operating since 2007 and is also known as APT 3 and Gothic Panda.
As cyber-crime evolves, attacks are complex and creative, and often tailored to the targeted industries and organizations. Therefore, to respond appropriately, one must engage in advanced threat hunting that takes the human factor in consideration.
Today, most of the cyber security community focuses on technical...
Like its mythological namesake, the source code for Zeus malware appears to be immortal. New variants continue to surface, including the Terdot banking Trojan, which is also designed to steal email and social networking credentials while remaining hidden.
HyphBot botnet malware is forcing infected PCs to sneakily view high-priced video ads, allowing fraudsters to reap upwards of $1.3 million in daily ad spending, a Danish advertising technology firm warns. The scheme highlights the challenges facing online advertisers seeking legitimate viewers.
Give crooks credit for topicality: They remain loathe to miss a trick. Indeed, hardly any time elapsed after Uber came clean about the year-old breach it had concealed before crack teams of social engineers unleashed appropriately themed phishing messages designed to bamboozle the masses.
HealthcareInfoSecurity Executive Editor Marianne Kolbasuk McGee reflects on the just-concluded Healthcare Security Summit in New York in the latest edition of the ISMG Security Report. Also, PCI Security Standards Council CTO Troy Leach addresses ransomware risks.
A British man who was initially arrested on suspicion of hacking English socialite Pippa Middleton's iCloud account has been sentenced to serve a three-year prison sentence after he pleaded guilty to unrelated fraud and blackmail crimes. But he may also have ties to The Dark Overlord extortion gang.
The European Union's recently passed Global Data Protection Regulation or GDPR is something that all boards should be paying attention to. This regulation can affect any business, big or small, that houses data on EU customers and the board of directors is inherently responsible for making sure that data is being...