A Data Protection Officer’s Guide to the GDPR Galaxy

In April 2016, the General Data Protection Regulation (GDPR) was passed into law in the European Union. The goal of the law is to give individuals control over their own data. While GDPR became law in 2016, it won’t become enforceable until May 25, 2018. GDPR is composed of 99 articles and 173 recitals that are used […]

Have you evaluated the cost of a cloud outage?

New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are therefore ill prepared to deal with the impact of an outage. While cloud service providers offer infrastructure-based service level objectives, the research indicates that many organizations fail […]

PinkKite point of sale malware spotted in the wild

Researchers have discovered a new family of point-of-sale (PoS) malware which is far more powerful than its small size would have you believe. As reported by ThreatPost, researchers from Kroll Cyber Security spotted the new malware, dubbed PinkKite, in 2017. According to Kroll Cyber Security, PinkKite was uncovered during an investigation into a nine-month PoS campaign […]

9 reasons to be cautious with blockchain

Is blockchain — the network of global online ledgers — really secure? Its proponents say yes, as it assigns transactions or smart contracts to an immutable ledger, verifiable by multiple parties. However, a recently published paper calls out some vulnerabilities that may subject blockchain entries to inefficiencies, hacking and other criminal activity. The paper, published by Xiaoqi […]

Identifying Security Blind Spots For You And Your Customers

The security landscape is a minefield for small businesses, and their service providers. After a year of high-profile cybersecurity stories – from WannaCry to Equifax to Spectre and Meltdown – providers are facing difficult conversations with their clients about their preparedness against attacks. But, those conversations will be far more complicated if they’re brought on […]

Meltdown and Spectre will delay patching for most organizations

Complexity and challenges associated with the Spectre and Meltdown patches will result in companies delaying future patch rollouts, according to Barkly. 72% of organizations planned to slow future rollouts and yet 50% of organizations lack a strategy for securing endpoints that are waiting to be patched, leaving companies exposed. Applying the Meltdown and Spectre patches has been a […]

Best practices to tackle challenges posed by digital twins

Forty-eight percent of organizations that are implementing the Internet of Things (IoT) said they are already using, or plan to use digital twins in 2018, according to Gartner. In addition, the number of participating organizations (202 respondents across China, U.S., Germany and Japan) using digital twins will triple by 2022. Gartner defines a digital twin as a […]

77% of Businesses Lack Proper Incident Response Plans

Your incident response plan probably isn’t as strong as you think it is, according to a new pool of research showing a broad gap between the perceived strength of incident response plans and their true effectiveness. In “The Third Annual Study on the Cyber Resilient Organization,” Ponemon researchers surveyed more than 2,848 IT and IT […]

What CISOs Should Know About Quantum Computing

Quantum computing is quickly moving from the theoretical world to reality. Last week Google researchers revealed a new quantum computing processor that the company says may beat the best benchmark in computing power set by today’s most advanced supercomputers. That’s bad news for CISOs because most experts agree that once quantum computing advances far enough and spreads […]

What’s the C-Suite Doing About Mobile Security?

For too long, too many companies have viewed security as an IT problem. Breaches are considered just another cost of doing business rather than a risk that requires proactive focus by the C-suite. But breaches are a risk to take seriously for C-suites and their companies. Just think about the recent Equifax breach, after which […]