Managing Security Is More Realistic Than Solving It, Says ARM’s Chief Executive

Last year, ARM infused its hardware security technology called TrustZone into fraction-of-a-millimeter-sized chips to be used in connected bandages or package trackers. But on Tuesday, the chief executive of the chip designer underscored another vital form of security. Read why Simon Segars of ARM says that managing security is more practical than trying to solve it on […]

The fight to defend the Internet of Things

Read Raj Talluri list methods to fight the Internet of Thing security menace on Network World : The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of smartphones […]

The 4 types of cybersecurity threats and a formula to fight them

Wells Fargo’s chief information security officer Rich Baich has to be very strategic about the way he spends his budget in order to protect the bank from the endless stream of cyberattacks launched at it every day. Read Rich Baich of Wells Fargo describe four types of cyber security threats and how companies could fight […]

The precarious state of maritime security in Libya poses a major risk to shipping

A series of incidents between armed Libyan vessels and foreign vessels off the Libyan coast raises questions about the state of maritime security in the region. Experts now say there is a credible threat of armed craft harassing or seizing vessels within 50 km of the Libyan coastline. In many cases, armed vessels claim to […]

Are counterterrorism efforts endangering end-to-end encryption in Europe?

The European Union has once again warned tech firms that use end-to-end encryption: Self-regulate or face heightened regulations. A new text, adopted at a Brussels summit on Thursday, did not enact any new measures. It did state that “challenges posed by systems that allow terrorists to communicate in ways that competent authorities cannot access, including […]

More than half of corporate travel managers cite heightened safety concerns

Employees are more concerned than ever about traveling abroad. In a survey of 239 corporate travel managers, more than half (56 percent) said reports of safety concerns had risen over the past year. Companies are struggling to keep up with the legal and administrative burdens that accompany such heightened security concerns (e.g. Should they offer […]

In North America, 20% of All Data Breach Incidents Are in the F&B Industry

Trustwave released the 2017 Trustwave Global Security Report which reveals the top cybercrime, data breach and security threat trends from 2016. The report demonstrates both good and bad news in the world of cybersecurity as intrusion detection and breach containment times were relatively better, but other threats like malvertisements became cheaper and malicious spam saw […]

Hit by a data breach? 5 steps you must take

Whether it’s a ransomware attack or a cyber security incident, organizations have specific obligations to manage the incursion and file appropriate reports with the federal government. For example, the Office for Civil Rights of the Department of Health and Human Services recently outlined the basic steps for healthcare organizations to take in response to a […]

Data Breach Costs Drop Globally But Increase in US

The average cost per data breach is now $3.62 million worldwide, marking a 10% drop from the $4 million average cost-per-breach in 2016. This marks the first time data breach cost has decreased overall since IBM created its Cost of Data Breach report, which was published June 20. The good news unfortunately doesn’t apply to everyone: […]

How Physical Access Systems Will Be Affected by GDPR

The EU General Data Protection Regulation (GDPR) is marks the biggest change to European data protection law in a generation. With GDPR  set to go into effect on 25 May 2018, security professionals must have a plan for all data stored on physical access systems. IFSEC Global provides insights for GDPR planning here. For firms in […]