Tag "Cyber Incident"

Back to homepage
Identity Theft

Inside Incident Response: 6 Key Tips to Keep in Mind

Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach. Most data breaches we see in the

Industry Insights

Growing mobile cybersecurity incidents spur plans for increased security investment

A majority of RSA attendees plan to spend more on mobile security in the coming year, Lookout has discovered. Since critical data has moved to the cloud, employees are able

Industry Insights

CISO’s guide to an effective post-incident board report

A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the incident often results in major service

Hardware/Network

Smart Home Threats: Securing Your IoT Devices Against Cybercrime and Oversharing

The Internet of Things (IoT) encompasses the billions of devices that are connected to the web all over the world. Smart home devices, like virtual assistants, make our lives more convenient but

Industry Insights

Why cybersecurity education matters

The shortage of qualified cybersecurity personnel is visibly apparent with the number of unfilled cybersecurity roles on the rise.Research shows cyber incidents have increased significantly since 2017 and according to a recent

Industry Insights

How deception changes the rules of engagement in cyber security

Carolyn Crandall, Chief Deception Officer at Attivo Networks, explores how deception techniques can provide not only early detection of malicious activity but also an invaluable insight into an attacker’s methods.Deception

IT Compliance

Implementing ISO 27001 and Avoiding Potential GDPR Consequences

With the increase in cyber-attacks and information security breaches – 72% of large UK firmsidentified an information security breach in 2018, a rise from 68% from 2017 – the importance of protecting both

IT Compliance

Why Compliance Does Not Equal Security

A company can be 100% compliant and yet 100% owned by cyber criminals. Many companies document every cybersecurity measure and check all appropriate compliance boxes. Even after all that, they

Software

Hackers Threaten to Release 9/11 Data ‘Trove’

A notorious hacking group is claiming to have put up for sale stolen legal and other documents relating to the 9/11 terrorist attacks. The individual(s) known as ‘The Dark Overlord’

Industry Insights

High profile incidents and new technologies drive cybersecurity M&A to record highs

The Cybersecurity M&A Market Report from international technology mergers and acquisitions advisors, Hampleton Partners, outlines how high profile hacks, the global digitisation of business and new regulations are driving record