Archive
New cybersecurity threats unwrapped: Hidden Cobra, public safety apps, Western Digital My Cloud
The North Korean government’s malicious activity also made it into this month’s cybersecurity report from HIMSS.December saw another round of cyber threats emerge that highlight healthcare’s need to better communicate.
ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned?
Automatic Dependent Surveillance Broadcast (ADS-B) is a technology mandated in all commercial and general aviation aircraft by 2020. It gives the pilot a kind of weather radar and assists with
Take a Dive: Deep Network Insights for Deeper Analytics
Security analytics are only as good as the data that feeds them. I’m not saying that advanced analytics such as machine learning and artificial intelligence (AI) aren’t amazingly powerful and
The Case of Disappearing Vulnerabilities
The growth of Software-as-a-Service (SaaS) has fundamentally changed the security model. As applications shift from on-premise to the cloud, the burden of securing them also shifts: from customer to developer.
8 security breaches that got someone fired
Some deserved the blame, and some seemed to just be at the wrong place at the wrong time. Click here to view original webpage at www.csoonline.com
How to protect personally identifiable information (PII) under GDPR
The EU’s General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here’s what you need to know.The European Union’s (EU’s) General Data Protection Regulation (GDPR)
The Disconnect Between Cybersecurity & the C-Suite
Most corporate boards are not taking tangible actions to shape their companies’ security strategies or investment plans, a PwC study shows. Despite all the attention that massive hacks and other
How to turn GDPR into an opportunity for your business
Businesses in the technology sector can use the General Data Protection Regulation as a positive opportunity for digital transformation Compliance with GDPR will no doubt require a fair amount of
In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach
There have been countless cyberbreaches over the past few years in which personal data, such as user IDs and passwords, have been compromised. These range from attacks against government agencies,