Cloud Security: 8 Things You Need to Know When Choosing a Storage Service

When you decide to start using a cloud storage or online backup provider, you may have some worries about security: we’ve all seen the sensational headlines about starlets having naked pictures of themselves stolen from their online accounts. The power that the U.S. Senate has recently granted to ISPs may also inspire worry. Read about […]

New Mexico and its New Data Breach Notification Law

Read Montserrat Miller explain the complete details of the New Mexico data breach notification law on JDSupra : We are almost to a point where all 50 states and the District of Columbia will have some form of data breach notification law on their books to protect residents’ personally identifying information (PII) in the event of […]

Can IoT security gaps be plugged before a massive attack?

Read Nick Ismail’s article about whether the Internet of Things security gaps can be plugged before a massive attack on Information Age : By 2050, there could be as many as 50 billion devices connected through the Internet of Things. There’s absolutely no doubt the internet of things is going to be widespread. What should […]

Businesses leave gaping holes in cybersecurity plans

Read why Tim Wallace  says that businesses leave gaping holes in cyber security plans on Telegraph : Britain’s businesses are increasingly aware of the threat of cyber attacks, but often do not know how to combat digital crimes or how to report attacks. A total of 94pc of firms believe IT security is important, but only […]

How do we measure the terrorism threat? How should we measure it?

The UK, like many countries, has a five-tiered terror warning system. Security risks fall into the following categories: low, moderate, substantial, severe, and critical. After the most recent Westminster attack, officials have raised the threat level to “severe,” but how reliable are such warning systems? Some analysts argue that terror alerts, based on subjective judgments […]

Maritime security in Nigeria gets a boost with biometric technology

Nigerian ports are getting an extra layer of security in the form of biometric identity cards meant to be used by port operators. In addition to implementing such security measures, which puts the country in compliance with global standards, government officials also floated the idea of an overarching continental maritime security strategy. Read more about […]

Travel insurance tips: What to do if the London terror attack affected your plans

If you had to cancel or delay your trip because of the London terrorist attacks, there are a few steps you can take to figure out if your insurance company will reimburse you. In order to activate your coverage, the government must first declare the attack a terrorist incident.  Although the British government has already […]

Incident Response: How to Prepare for Attacks and Breaches

Read  Cynthia Harvey’s article about how organisations can prepare for attacks and breaches on eSecurity Planet : If a hacker breached your network today, what would you do? What if a company employee unwittingly infected your systems with ransomware? What if attackers defaced your website or launched a distributed denial of service (DDoS) attack? What […]

Network Access Control: Restricting and Monitoring Access to Your Network and Data

Read why Sue Marquette Poremba says that using right network access control can add a new level of cyber security to organisations on eSecurity Planet : The best cybersecurity comes in layers, making it difficult or frustrating for an intruder to fight through each line of defense to break into the network and gain access […]

Attackers thrive on misaligned incentives, executive overconfidence

Read how the cyber criminals thrive on misaligned incentives and executive overconfidence on Enterprise Innovation : Cybercriminals have the advantage, thanks to the incentives for cybercrime, while defenders are hard-pressed to keep up as they often operate in bureaucratic hierarchies, according to Intel Security. Based on interviews and a global survey of 800 cybersecurity professionals, additional […]