Search Results | Malware
PREV 1...20   30   40...64   65   66   67   68   69   70   71   72   73...77 NEXT
Sort by:  Most Relevant  |  Date
Risk assessment and the Nu M8 Child Tracker

Blog  A few weeks ago I allowed my 7 year old daughter to walk the last 400 yards from the bottom of the road to the school gate by herself. Off she trotted, full of her own independence, and away she went. About half an hour later the school headmistress called me "did you know that your daughter arrived...

Last updated: Jan 7, 2009   9:30 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Misc, Network security, Security management
IoT device breaches: Consumers can help, but onus is on device vendors

Blog  IoT device manufacturers have by and large flooded the market with web-connected products that have little or no security measures to speak of. There remains such a focus on usability, features and time-to-market (especially with the more ubiquitous lower-end devices) that there's a real threat to t...

Last updated: Jun 4, 2018   7:58 PM GMT  |  Blog: IoT Agenda   |      ARM, Consumer IoT, DDOS
Time to welcome CCIE Security Version 5 Written and Lab exam

Blog  Starting today i.e. 31st Jan 2017 , CCCIE Security Version 5 exams both lab and written are available for all CCIE aspirers all over the globe in authorised centres. The written exam known as CCIE Security Written Exam (400-251) version 5.0 is a two-hour test with 90-110 questions. However the CCI...

Last updated: Jan 31, 2017   5:23 AM GMT  |  Blog: Network technologies and trends   |      ASA, CCIE, Cisco
When software becomes a utility, everything changes - and it will

Blog   It's a challenge faced so far only by the most ultra-successful software companies, but a major turning point comes when a product becomes a utility. It doesn't happen often, but there's a big difference when a piece of software goes from something you use to compete against your rivals, to someth...

Last updated: Aug 31, 2012   10:50 AM GMT  |  Blog: Computer Weekly Editor's Blog   |      Apple, iPhone, Java
Baited breadth - the rise of phishing

Blog  Reviews of organisational security can be viewed in many positive ways, but all too often with trepidation or resignation. The rise of phishing, where spoof, but increasingly credible, messages try to obtain sensitive information, is a particularly troublesome challenge. It exploits one of the weake...

Last updated: Feb 13, 2018   9:12 PM GMT  |  Blog: Quocirca Insights   |      Uncategorized
Reimagining the IIoT revolution through built-in security

Blog  If there's one truth to operational security that many don't want to hear, it's that any system can be compromised. As a multitude of industries like utilities, manufacturing, and oil and gas are adopting industrial internet of things devices -- a market set to boom to 100 billion devices over the n...

Last updated: Nov 19, 2018   3:26 PM GMT  |  Blog: IoT Agenda   |      chip security, Cyber security, Endpoint devices
Will cybersecurity safety ever equal air travel safety?

Blog  Aviation safety provides an aspirational model of a safety success story when you consider that over the past 50 years, even as total passenger miles have exploded, commercial airline fatalities have plummeted. The commercial aviation industry has an admirable safety record, but can the lessons lea...

Last updated: Nov 29, 2018   5:54 PM GMT  |  Blog: Security Bytes
At RSAC 2019, speculative execution threats take a back seat

Blog  The Meltdown and Spectre vulnerabilities disclosed in early 2018 dominated much of the infosec discussions and news coverage last year, including those at RSA Conference 2018. But at this year's event, speculative execution threats are virtually non-existent. RSA Conference 2019 has a single item o...

Last updated: Feb 20, 2019   2:52 PM GMT  |  Blog: Security Bytes   |      Security
Top 3 enterprise IoT challenges to overcome to ensure success

Blog  IoT is playing a pivotal role bridging the gap between the enterprise technologies of today and tomorrow. So much so that by 2020, more than half of all major business processes and systems will incorporate IoT elements to some degree. However, that doesn't mean businesses should expect IoT-driven ...

Last updated: Feb 26, 2019   9:52 PM GMT  |  Blog: IoT Agenda   |      Enterprise IoT, Integration, Internet of Things
Cyber Security Needs to Start With the Simple Things

Blog  There is no way to ensure you dont ever get hacked. After all, government agencies with insane security systems also get their data stolen by hackers from time to time. Of course, there is a huge difference between people who perform cyber attacks on government agencies and those who target indiv...

Last updated: Jun 7, 2019   12:11 AM GMT  |  Blog: SAS 70
New Cloud Daddy CEO aims to 'tell the world' about AWS protection

Blog  The new CEO of AWS data protection provider Cloud Daddy is looking to tell his company's story and drastically increase its customer count. "We've got to get people to know about Cloud Daddy," said Spencer Kupferman, the former president and CEO of reporting and automation platform provider Global ...

Last updated: Jun 21, 2019   12:46 AM GMT  |  Blog: Storage Soup   |      Cloud Backup
Securing the 'M' in IoMT to ensure patient safety

Blog  The market for the internet of medical things, or IoMT, which includes medical devices, servers and applications that connect to computer networks, is experiencing explosive growth. Hundreds of thousands of connected medical devices, such as patient monitors, IV pumps, MRI machines, infusions pumps ...

Last updated: Apr 4, 2019   3:07 PM GMT  |  Blog: IoT Agenda   |      Connected Health, connected healthcare, Healthcare
Who has control of your control systems?

Blog  Cybercriminals are constantly probing consumer IoT devices such as home routers, IP cameras and printers to find access points into the network. Once they have access, they can disrupt network functions, gather critical information and deliver malicious payloads. At the other end of the spectrum, cy...

Last updated: Oct 4, 2019   5:10 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, Internet of Things, iot
Joining up the fight against cybercrime: James Brokenshire's comments at conference in Westminster

Blog   On Wednesday James Brokenshire, Minister of State for Crime and Security, spoke at the launch of Fighting Fraud Together. he was hosted by the Lord Mayor of London in the Mansion House, whose comments I quoted in my previous blog.     Yesterday James addressed Westminster, at the ann...

Last updated: Oct 14, 2011   12:00 AM GMT  |  Blog: When IT Meets Politics   |      Cybercrime, Eurim
Security Forecasts for 2007

Blog  Its getting to that time of the Season when many of us look ahead to a New Year with mixed emotions of hope, fear, uncertainty or just plain boredom. What will 2007 bring? Will it be more of same? Will it herald a new age of prosperity or danger? Heres my Top 10 Security Trends of the coming ...

Last updated: Dec 29, 2006   11:26 AM GMT  |  Blog: David Laceys IT Security Blog   |      Predictions, Professionalism, Technology
User Behavior Analytics (UBA) & Ransomware Analytics

Blog  User Behavior Analytics (UBA) enables organizations to identify suspicious activity based on how a user interfaces with systems and the environment. Their typing style, most used commands, morning routine, the applications they use, the rate at which they work and many other facets can be analyzed...

Last updated: May 18, 2016   4:57 PM GMT  |  Blog: Virtual CISO   |      Ransomware, Threat detection, Threat intelligence
Risk Assessment Process

Blog  Somebody asked me if I'd put a bit more detail around some of the high level topics I cover in this blog. So I thought I'd talk a bit about the risk assessment processes that I follow. There are a variety of ways of assessing risk. Most basic is an assessment made based on our own thoughts and opin...

Last updated: Feb 8, 2007   7:30 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Risk assessment
Medical devices next frontier for hackers, HIPAA security

Blog  Our HIT crystal ball has been flashing brightly lately, signaling the need for some sort of overhaul for FDA medical device regulations: First, a few months back, a source mentioned in an interview that he's not as concerned about HIPAA compliance with Wi-Fi enabled medical devices that transmit p...

Last updated: Oct 24, 2012   5:46 PM GMT  |  Blog: Health IT Pulse   |      health IT security, HIPAA, medical devices
Are you protecting your SMB customers? Securing the internet of things

Blog  Much of the national conversation about the internet of things has centered around connected consumer devices such as watches, cars and thermostats. Businesses don't think about the cybersecurity settings of their photocopiers, yet 2016's Mirai malware used hundreds of thousands of IoT devices to cr...

Last updated: Jan 26, 2017   9:06 PM GMT  |  Blog: IoT Agenda   |      Enterprise IoT, Internet of Things, iot
For cybercriminals, IoT devices are big business, part one

Blog  When people think of cybercrime, they tend to think of geeks in dark rooms staring into computer monitors trying to figure out some new way to infiltrate a network. And historically, that was a pretty accurate assessment. Today, however, cybercrime is a business. Cybercriminals tend to keep busines...

Last updated: Aug 10, 2017   3:59 PM GMT  |  Blog: IoT Agenda   |      Cybercrime, cybercriminals, Internet of Things
PREV 1...20   30   40...64   65   66   67   68   69   70   71   72   73...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: