Oil and gas industry on guard for cyber attack

The scale and severity of the recent international ransom-ware cyber attack has elevated urgency in the oil and gas industry to detect and defend against potentially debilitating threats and actions. Those with specialist knowledge suggest that in most cases, cyber and physical attacks are disassociated, although “cyber physical” attacks, where control systems are hacked to cause […]

How to protect yourself from ransomware attacks

A decade-old form of malicious software known as ransomware has been making headlines after cybercriminals hijacked hundreds of thousands of computers worldwide. Ransomware, which is often transmitted by email or web pop-ups, involves locking up people’s data and threatening to destroy it if a ransom is not paid. Read how to protect yourself from ransomware attacks […]

What we can learn from the Google Docs hack

Read Rick McElroy’s article about the new phishing attack using Google Docs on CSO Online : An interesting new phishing attack emerged last week, on Google Docs. “The vulnerability was exposed for only about one hour, and a spokesperson told NBC News that it affected ‘fewer than 0.1 percent of Gmail users’ — which would still […]

DDoS Attacks Surge, Organizations Struggle to Respond

Despite heightened awareness of distributed denial-of-service (DDoS) attacks, organizations are taking longer to detect and respond to them. Read about the new report by Neustar which reveals that 84% of respondents say their organizations have experienced at least one DDoS attack in the past 12 months, compared to the 73% who said the same thing in […]

Cybersecurity threats that keep the banks up at night

Read Scott Carey’s article about the changing threat landscape for banks and financial institutions on CSO Online : In the current climate of major data breaches amidst an ever-shifting cyber threat landscape, the people in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers and […]

Facts About DDoS That Aren’t True

Read Priti Shetti’s article dispelling some myths about DDoS attacks on Host Review : Although Distributed Denial-of-Service (DDoS) attacks remains as prevalent as ever, there are still some surprising myths that goes around them. Misleading information can not only misguide users, but also stand as a severe threat to business. Facts are not manipulated, but […]

These IoT Challenges Pose the Biggest Threat to Customer Satisfaction and Retention

Read Vikas Agrawal list top Internet of Things challenges that pose threat to customer satisfaction and retention on Customer Think : The Internet of Things (IoT) has been hailed as one of the biggest disruptive forces of the 21st century – and for all the right reasons. We are now speaking to our cars, refrigerators, […]

6 common enterprise cybersecurity threats and how to avoid them

As enterprises continue to add new technologies to the business, CIOs must be constantly alert to the cybersecurity threats that those technologies open up. At the 2017 Midmarket CIO Forum in Savannah, GA, Brian Hill, vice president of corporate investigative services at Computer Forensic Services, explained several major security vulnerabilities currently facing businesses. Read about […]

Taming the SaaS security wilderness

Read why Mathias Thurman says that companies need new tools as rogue applications proliferate on Computer World : The security risk that I am most focused on right now is this: Shadow IT and the consumerization of IT have put too many employee work activities out of sight of the security department. Employees at my company now […]

Sharpen your DDoS detection skills with the right tool

Read Kevin Beaver’s article about how companies can protect themselves from DDoS attacks with the right tools on Tech Target : Distributed denial-of-service attacks are some of the most serious security attacks in modern computing, yet we tend to know very little about them. DDoS attacks are, in essence, launched by multiple systems — often […]