The age of hacking brings a return to the physical key

Read why Jungwoo Ryoo says that growth in hacking incidents is taking us back to the days of physical key on The Conversation : With all the news about Yahoo accounts being hacked and other breaches of digital security, it’s easy to wonder if there’s any real way to keep unauthorized users out of our email […]

Cybersecurity Forum Reviews Business and Government Response To Hacking

Champlain College in Burlington, Vermont is home to the Leahy Center for Digital Investigation. The state-of-the-art lab allows students to assist in computer forensics and digital investigations in the public and private sectors. The facilities recently hosted a cybersecurity forum for businesses and non-profits to help them understand digital threats. Read the opinion of experts […]

Internet of Things security: What happens when every device is smart and you don’t even know it?

Read why Danny Palmer says that Internet of Things connected devices are a security headache on ZDNet : Billions more everyday items are set to be connected to the internet in the next few years, especially as chips get cheaper and cheaper to produce — and crucially, small enough to fit into even the smallest […]

Cybersecurity in 2017: Four threats to watch

It may be a new year, but fraudsters haven’t shifted their focus from cyber. And, with cybersecurity an ongoing arms race, threats are evolving constantly. Exposures can significantly impact your credit union, so it’s critical to be in tune with the latest cyber trends. Read about the four cyber security threats that businesses should watch out […]

Understanding the threat of low-cost terrorism

Authorities have been warning about low-cost terrorism for a while, and yesterday’s attack in London, which featured a combined vehicle and knife attack, was proof of the danger. Read Brian Michael Jenkins, terrorism expert and senior adviser to the president of the RAND Corporation on the threat: There are precedents for this, and the attractiveness […]

The Orly airport shooting: A case study in the limitations of travel insurance?

If the temporary closure of the Orly airport in France affected your flight, you might not be able to obtain compensation under your insurance plan. That’s because the U.S. State Department has not yet declared the event a terrorist attack, a prerequisite for those who want to take advantage of their policy’s trip cancellation provisions. […]

UK is the latest country to ban electronic devices on flights

If you’re flying to the UK from any one of six countries, you’ll have to check your tablets and laptops with your luggage. That’s because the UK government is in the process of banning such electronic devices (except smartphones) on flights from Turkey, Jordan, Tunisia, Saudi Arabia, Egypt, or Lebanon. The government hasn’t said when […]

Ransomware rising, but where are all the breach reports?

Presence Health set the bar high with its $475,000 settlement with the Department of Health and Human Services’ Office of Civil Rights earlier this year. The settlement, announced January 9, 2017, is the first HIPAA monetary enforcement on a healthcare organization for untimely breach reporting, according to HHS. Read how despite rising ransomware attacks, the […]

Security Priorities and Multi-Cloud Migration – What to Secure First

Read Oliver Pinson-Roxbrough make a case for multiple cloud migration on Infosec Magazine : There is no shortage of news on public cloud adoption trends in our industry, but what isn’t regularly making the headlines is the trend towards multi-cloud adoption. Industry experts and analysts like Gartner recommend standardization on multiple IaaS cloud service providers as a […]

Customers cyber aware, but not fully cyber-prepared

Protection 1, which operates its own Network Operations Center, is seeing a rise in customers separating their security network in order to stay more cybersecure. Security Systems News talked with several professionals at Protection 1 about how cyberaware end users are today and the similarities and differences in cyber- and physical security solutions. Read why Michael […]