Companies Concerned about Rising Ransomware and Cyberthreats

The New York State Department of Financial Services recently released a draft dictating new cybersecurity regulations for finance sector. Hailed the first of its kind in the United States, it has received a fair share of criticism as well. The Bitcoin companies in the region come under NYDFS, which makes these new regulations applicable to […]

Privacy expert shares tips for preventing visual hacking

When the Ponemon Institute released its 2016 Global Visual Hacking Experiment, the research firm found that 91 percent of visual hacking attempts are successful. Visual hacking applies to spying on physical items, like someone’s desk, computer screen or mobile device, even paper records. Read Kate Borten of the Visual Privacy Advisory Council explain how companies can prevent visual […]

Hacking your data without touching your network

Read about the risks when cyber criminals hack your data without touching your network according to Patrick Marshall on GCN Blog : It’s an IT manager’s nightmare.  A hacker — perhaps an employee, a service provider or custodial staff — plants a sensor near a critical server to capture the flow of data without ever having […]

Cyber Security How Deleted Files Are a Goldmine for Cyber Criminals

In an increasing complex business world digital and computer security – cybersecurity or IT security, is increasing a preoccupation. Business leaders, employees need to consider the protection of information systems from advanced theft or damage to the hardware, the software, and to the information on them, as well as from digital disruption, data hacking or misdirection […]

What’s Behind the Surge in Healthcare Data Breaches?

Read Steven Linwood take a look at the reason behind the surge in healthcare data breaches on Data Insider : 2015 won’t go down in history as one of the brightest moments in healthcare, as it was more notable for serious data breaches than for medical advancements and innovations. For the first half of 2016, […]

4 Simple Ways To Detect And Mitigate Cloud Computing Risks

Read about the four simple ways in which companies can detect and mitigate cloud computing risks on Fincyte : Companies have eventually stopped wondering whether it’s safe to move data to the cloud. They simply do it, and now more confidently than ever before. But security still remains a problem that can’t let businesses breathe […]

Incident response survival guide

Read Elad Yoran’s data breach incident response survival guide on Help Net Security : All organizations are impacted by a security breach at some point. As the joke goes in the security industry, businesses fall into two categories: those that have been breached and those that don’t know they have been breached. Read his full article […]

6 Things Startups Can Do to Stop Cyber Attacks

Read Naman Nepal explain five things startups can do do to prevent cyber attacks against them on Tech : As many unfortunate startups know, cyber attacks do not only affect large businesses. For smaller companies, the effects can be devastating. If you are connected to the web, either with a computer or mobile device, you are […]

Many tech senior decision-makers don’t understand encryption

Nearly a quarter of tech senior decision-makers in the UK don’t fully understand encryption, according to PKWARE. This number increases to 40% in the retail sector and half in the healthcare sector. Overall, only 50% of respondents said they encrypt their customer data. Read about the new study by PKWARE which reveals that most decision […]

Security Issues in IoT

Read Gabe Moretti’s article about security issues in Internet of Things on Chip Design : Security is one of the essential ingredients of the success of IoT architectures.  There are two major sides to security: data security and functional security.  Data security refers to the avoidance that data contained in a system is appropriated illegally. Read […]