The ethical and legal dilemmas of threat researchers

Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter threat researchers, the advanced scouts of cybersecurity. They are becoming more numerous and conspicuous as more intelligence on illicit hacker activity is demanded. Threat researchers trawl through the dark web, pick apart […]

Lawsuits threaten infosec research — just when we need it most

This year, two security reporters and one researcher will fight for their professional lives in court. Steve Ragan, senior staff writer at tech news site CSO, and Dan Goodin, security editor at Ars Technica, were last year named defendants in two separate lawsuits. The cases are different, but they have a common theme: they are being sued […]

Global CISOs Unprepared for Evolving Threats

Research by the Ponemon Institute focusing on chief information security officers (CISOs) worldwide has found worrying levels of business readiness for cybersecurity threats. Read about the new study by Ponemon Institute which reveals that 83% of CISOs surveyed said the frequency of data breach will increase or stay the same while another 87% believe the severity […]

Ransomware Analysis Promises Bleak Future with No Recovery

The future of ransomware does not offer any good news, as analysis shows new tactics and advancements by operators. According to analysis by Carbon Black’s Threat Analysis Unit of 1000 ransomware samples, researchers found that ransomware will increasingly target Linux systems and look to conduct SQL injections to infect servers and charge a higher ransom price. […]

The Internet of Things Connectivity Binge: What Are the Implications?

Read Lee Rainie and Janna Anderson study the implications of Internet of Things on Pew Research Center : Connection begets connection. In 1999, 18 years ago, when just 4% of the world’s population was online, Kevin Ashton coined the term Internet of Things, Neil Gershenfeld of MIT Media Lab wrote the book “When Things Start […]

UK’s ICO Doubled Number of Data Breach Fines in 2016

UK firms were among the hardest hit in Europe when it came to breach-related regulatory fines last year, as the ICO stepped its enforcement work up considerably, according to new PwC research. Read about the new research by PwC which reveals that breaches of the Data Protection Act (DPA) in United Kingdom resulted in 35 […]

Survey: U.S. execs bearish on 2018 cybersecurity spending, despite increase in threats

Only 49 percent of surveyed U.S. executives expect to spend more on cybersecurity in a year’s time, despite a 56-percent majority expecting the number of data breach attempts to rise in 2018, according to a new research study. Read about the new research by Ovum which reveals that nearly half of U.S. executives expect cyber security […]

Guidance for connected vehicle security: Attack vectors and impacts

The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) Working Group, “Observations and Recommendations on Connected Vehicle Security” provides a comprehensive perspective on vehicle security connectivity design, possible attack vectors of concern, and recommendations for securing the connected vehicle […]

Survey: Americans have shallow understanding of cybersecurity

When it comes to cybersecurity, Americans recognize the need for strong passwords and know that public Wi-Fi hotspots aren’t necessarily safe for online banking or e-commerce. But U.S. adults are not as good at recognizing email “phishing” schemes or determining if the website where they’re entering credit card information is encrypted. Read about the new Pew Research […]

IT Workers Expect Industrial Internet of Things Attacks to Rise

As the technology industry races to embrace the internet of things (IoT) and all the benefits it can bring, it has also been quick to warn about the security implications too. There have already been a number of examples of everyday IoT devices, such as security cameras and webcams, being hijacked and used to launch […]