What Global Manufacturers Need to Know About Security in the Cloud

Manufacturers deal with sensitive information each and every day. This includes test and quality data, warranty information, device history records and the engineering specifications for a product that are highly confidential. Trusting that data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software. Consider the questions below as a guide to…

January 8, 2018
Read More >>

Security in Operational Technology: Five Top Trends in 2018

“There has been a noticeable increase in security issues and data breaches during recent years in a variety of industries. Following an upsurge of Internet of Things (IoT) devices being utilised in industrial environments and critical infrastructures, it is clear operational technology (OT) is next in line for some very bad news. The critical systems that monitor and control our power distribution networks, our industrial capacity and our connected healthcare…

January 5, 2018
Read More >>

Security in Operational Technology: Five Top Trends in 2018

“There has been a noticeable increase in security issues and data breaches during recent years in a variety of industries. Following an upsurge of Internet of Things (IoT) devices being utilised in industrial environments and critical infrastructures, it is clear operational technology (OT) is next in line for some very bad news. The critical systems that monitor and control our power distribution networks, our industrial capacity and our connected healthcare…

January 5, 2018
Read More >>

Bitcoin in the Darknet Ecosystem

2017 was without a doubt the year of Bitcoin. The first decentralized cryptocurrency, which had been skyrocketing from a value of $1,000 USD a Bitcoin in January 2017 up to a maximum value of $20,000 USD in December. The worldwide awareness of Bitcoin and the cryptocurrency phenomenon is affecting and challenging traditional financial institutions, investors and even governments in a variety of ways. The Underlying factors – what makes Bitcoin…

January 5, 2018
Read More >>

The 5 Motives of Ransomware

When 2017 began, we knew that ransomware  was going to be a major topic. However, who would have foreseen the impact of both WannaCry and NotPetya?  WannaCry hit the world on May 12, infecting more than 230,000 systems in over 150 countries. In the process, it caused havoc in the UK’s National Health Service, using the EternalBlue exploit that was part of the Vault7 leak of the U.S. National Security Agency…

January 4, 2018
Read More >>

Fake Android Security Tools Harvest User Data

Tens of Android applications masquerading as security tools were found bombarding users with ads, tracking their location, and secretly harvesting user data, Trend Micro reports. A total of 36 such applications were found in Google Play in early December, all of which executed the aforementioned unwanted behavior. The applications were posing as security utilities like Security Defender, Security Keeper, Smart Security, Advanced Boost, and more. The offending applications, the researchers…

January 4, 2018
Read More >>

Hackers Wreak Havoc in 2017, is 2018 Ready to Battle?

With a new year upon us, it’s time to reflect back on a rather turbulent 365 days in the cybersecurity space. Between leaked Game of Thrones episodes, WannaCry ransomware and new strains of the Mirai Internet of Things botnet, cyberattacks reached alarming heights in 2017. This increases the burden on companies to adapt to a rapidly changing threat landscape.   So, what will 2018 look like?   IoT must brace…

January 4, 2018
Read More >>

Global Security Threats You Need to Know About in 2018

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function, since new attacks will most certainly impact both shareholder value and business reputation. After reviewing the current…

January 3, 2018
Read More >>

The IT Security Lessons from 2017

George Santayana famously observed that: “Those who cannot remember the past are condemned to repeat it.”  In a year where data breaches escalated, and cyber-criminals found yet more ways to infiltrate the enterprise network, this quote came to mind. So, as 2017 draws to a close let’s look back over the year and reflect and evaluate past events in cyber security, and understand how they happened, so that we can…

December 22, 2017
Read More >>

Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud. In 2018, a few major new regulations, such as the EU General Data Protection Regulation (GDPR), which takes full effect in May, will start to swing the privacy pendulum towards better cloud security and more protections for consumers and end users. Here’s what that means for 2018: An…

December 22, 2017
Read More >>