How can a hypervisor deployment avoid security risks?

Read Judith Myerson explain how hypervisor deployment can help companies security risks on Tech Target : The risks of a hypervisor deployment include faulty implementation of hypervisor modules and configuration errors. These risks stem from the multiple ways the hypervisor virtualizes hardware resources to execute multiple computer stacks or virtual machines (VMs). Read her full article […]

IoT’s biggest threat: Systemic security flaws

Read why David Rolfe says that the systemic security flaws are biggest threat to Internet of Things on Tech Target : Nearly every week, we read another story related to an IoT security breach or hack. For now, the vast majority of these are individual failures by vendors, but organizations are facing an existential risk […]

The Many Faces Of Insider Threats

Read Richard Henderson analyze different types of insider threats on Forbes : You may not realize it, but the majority of data breaches today involve the role of an insider in some capacity. And did you also know that in many cases, these incidents aren’t malicious in nature? Insider incidents come in all shapes and […]

Rise and evolution of ransomware attacks

Read Giridhara Raam take a look at the rise and evolution of ransomware attacks on Help Net Security : Ransomware, malware that encrypts systems and then asks for a ransom to decrypt files and systems, has become more prevalent in recent years. In fact, two of 2017’s major cyberattacks were malware: WannaCry in May, followed […]

Insider Threats: Red Flags and Best Practices

Many businesses are finding the source of their greatest concerns are trusted employees with whom they interact every day. The insider threat is growing, with more than half (53%) of organizations confirming insider attacks in the past 12 months and 27% stating they have become more frequent, according to a new study. Read/see the slideshow explain […]

Government, business cybersecurity cooperation still faces roadblocks

Panelists speaking at a session titled Right Hand, Left Hand: Transparency, Communication and Conflict at the recent Cambridge Cyber Summit agreed that the government and private industry must cooperate to protect U.S. citizens’ data security and online privacy. Read why cyber security experts say that government and business cyber security cooperation is not going anywhere […]

5 Ways the Insurance Industry Can Improve Cybersecurity: Former U.S. Security Chief Clarke

“The insurance industry has a great record of solving problems where government regulation didn’t because the government either didn’t know how to regulate, or the government wouldn’t regulate,” Richard A. Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-Terrorism for the United States, told attendees at a recent cybersecurity insurance forum in Santa Clara, […]

How to establish a cyber security strategy

Read Hannah Gresty explain how companies can establish a cyber security strategy on Director : Given that the Petya ransomware attack in June paralysed thousands of companies worldwide – and that a firm breaching the EU’s General Data Protection Regulation (GDPR) next year could be fined up to €20m (£18m) – cyber security is clearly […]

Merging GDPR compliance and cyber-risk management

In preparing for the impending implementation of the EU General Data Protection Regulation, many organizations today are elevating cyber-risk to the top of the corporate agenda, a new cyber-risk perception survey has found. Read about the new report by Marsh titled GDPR Preparedness: An Indicator of Cyber Risk Management which found that many companies are using […]

Cyber security for SMEs: The three common misconceptions

Read David Jeffrey bust three common misconceptions about small and medium businesses cyber security on SME : No business, whatever its size, is immune from the growing threat of cyber crime, or criminal activity carried out by means of computers or through the internet. For many smaller businesses, however, cyber security competes with a variety […]