A Data Protection Officer’s Guide to the GDPR Galaxy

In April 2016, the General Data Protection Regulation (GDPR) was passed into law in the European Union. The goal of the law is to give individuals control over their own data. While GDPR became law in 2016, it won’t become enforceable until May 25, 2018. GDPR is composed of 99 articles and 173 recitals that are used […]

Why PKI will secure the Internet of Things for years to come

Modern cryptography came about in 1976 when Whitfield Diffie and Martin Hellman published a paper on key agreement protocol. The concepts discussed in the paper, New Directions in Cryptography, are still very much in use today, and form the genesis of public key cryptography. However, it is now believed that a British engineer, John Ellis had […]

Half of Cyberattacks in the Middle East Target Oil & Gas Sector: Siemens

Oil and gas sector networks in the Middle East have been the target of some of the most aggressive and significant cyberattacks known to the industrial sector to date. Now a new report from Siemens shows three-quarters of organizations there have been hit in the past 12 months by at least one attack that either […]

Facebook under pressure over 50 million user data breach

Facebook’s stock has plummeted as markets have opened, as the world reacts to the huge “data breach” scandal that broke over the weekend. The drop of roughly 5 per cent means that around $25 billion has been lost from the company’s market value. The company’s plunging share price comes amid growing controversy around whether the site […]

Why robot ransomware could cripple your business

Read why  Alison DeNisco Rayome  says that robots infected with ransomware are harmful for businesses on Tech Republic : Phishing emails aren’t the only vector for ransomware attacks to hit your business: Ransomware for robots is an increasing risk, as these devices can be exploited and locked to the detriment of business operations, according to […]

Cybersecurity careers and the internet of things

Read the cybersecurity careers in the Internet of Things on Seattle Times : Not everyone who is pursuing a master’s degree in IT wants to commit to becoming a cybersecurity professional, says Kendall Giles, an assistant professor of practice in Virginia Tech’s Online Master of Information Technology program. “Yet in today’s world, I think certainly […]

Researchers Uncover macOS and Safari Exploits at Pwn2Own 2018

The eighteenth annual CanSecWest security conference is underway in downtown Vancouver, Canada, where researchers are competing in the 11th Pwn2Own computer hacking contest for over $2 million in prizes. Day one results have already been published over at the Zero Day Initiative website, with a couple of successful Mac-related exploits already appearing in the list […]

Why doesn’t the USB fit both ways in your computer?

USB flash drives have become the intricate part of our online life. If you are online or in someways connected to a computer, there’s no way you can escape from USB drives. Nowadays, even cars and TVs come with USB ports so it is inevitable that you are somehow part of the great USB culture. USB […]

Have you evaluated the cost of a cloud outage?

New findings from a study by Veritas Technologies, indicate that 60 percent of respondents have not fully evaluated the cost of a cloud outage to their business and are therefore ill prepared to deal with the impact of an outage. While cloud service providers offer infrastructure-based service level objectives, the research indicates that many organizations fail […]

Power grid cybersecurity tool uses machine learning and sensors to detect threats

In today’s always connected world, losing power is more than just an annoyance. “The truth is, we rely on electricity much more than we realize,” writes Sherry Hewins in her column What Could Happen in a Long-Term Power Outage? “Even if you live ‘off the grid’ as I did for years, you are still living in a […]