Tag "Cyber Risk"

Back to homepage
Identity Theft

Retail data breaches continue to reach new highs

Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the past compared to

Hardware/Network

8 Big Processor Vulnerabilities in 2018

Since the Spectre and Meltdown vulnerabilities knocked the glow off of the new year, 2018 has been the year of the CPU bug. Security researchers have been working in overdrive

Industry Insights

Securing real-time payments with tokenization

For banks, direct debit (ACH) fraud represents a bigger financial risk than card fraud. In particular, growing momentum for real-time payment schemes across the world is creating huge opportunities for fraudsters and

Hardware/Network

To Grow The Internet Of Things, Improve Security

The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices.Research by Bain & Company finds that

Hardware/Network Software Security

How To Use The IIoT To Immunize Against Critical Infrastructure Hacks

On May 25th, the FBI recommended that all U.S. households and small businesses reboot their internet routers, due to infection by Russian malware. In March, we had reports of Russia hacking U.S.

Industry Insights

Magecart presents an unprecedented threat: Here’s what you can do

Recently we learned that the previously disclosed Ticketmaster UK breach from a few weeks ago was not a one-off event but instead part of a widespread website digital credit card skimming

Hardware/Network

Staying secure as the IoT tsunami hits

The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. Just when we thought we were

Software

Five Steps to Security Automation

Two weeks ago, Volvo, the Swedish automaker, announced plans for a Level 4 self-driving car by 2021. In the progression of automation levels for cars, as outlined by the National Highway Traffic

Software

Digital transformation – why your whole approach to security has to change

Darron Gibbard, Managing Director EMEA North of Qualys, explains to Information Age why organisations must overhaul their approach to security in order to achieve success in digital transformation. By making security

Software

File-Based Malware: Considering A Different And Specific Security Approach

The cybersecurity solutions landscape has evolved from simple but effective signature-based scanning solutions to sandboxing—the isolating layer of security between your system and malware—and, most recently, to sophisticated detection methods.