Cyber Security

Identity Management is Coming to the Internet of Things (DXC Technology Blog)

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonab... More

Phishers Play on Emotions to Fool Victims (Decipher)

Phishing has proven to be one of the more difficult security problems to solve, and new research from Google shows that it’s not just because humans are gullible. It turns out th... More

Package Delivery! Cybercriminals at Your Doorstep (Security Intelligence)

IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or someone... More

AI in Cybersecurity Works, But Watch the Hype (Tech HQ)

AI and automation technologies can help businesses cope with a proliferation of cyberthreats— but watch out for the hype.... More

NAGRA’s Simon Trudelle Talks Content Protection, OTT, Data (Digital TV Europe)

"The next big thing is simply thinking beyond just content protection, to scalable service protection. This means taking a holistic approach to service protection – one that scal... More

Preparing for Quantum Computing’s Devastating Impact on Cybersecurity (Verdict)

Quantum computers are often considered the next great advance in the computing space, with potential benefits for chemistry, artificial intelligence, cryptography and a host of oth... More

Industrial Cyberattacks See Huge Rise (IT Pro Portal)

Nowadays, hackers are more interested in wreaking havoc, rather than just creating malware that’s going to steal data or conduct some form of espionage. This is according to IBM... More

5 Biggest Cybersecurity Updates From Black Hat 2019 You Should Know (Analytics India)

The biggest event for hackers concluded in Las Vegas last week. During the conference, there were many revelations that threw light on the cybersecurity space and some of them were... More

NCC Group Launches Self-Service Cloud Compliance Platform (CDSA)

NCC Group has debuted "Scout," a new client self-service platform for public cloud configuration checking. The agnostic tool allows companies to monitor configuration of their AWS,... More

Microsoft Launches Azure Security Lab, Doubles Top Bug Bounty to $40K (VentureBeat)

Microsoft announced the Azure Security Lab, a sandbox-like environment for security researchers to test its cloud security. The company also doubled the top Azure bug bounty to $40... More

Edgescan Employees Talk Cybersecurity, New Career Opportunities (Infosecurity)

Ireland has been pushing to become a Cyber Security Centre of Excellence, but this can only be achieved with the right talent. Two recent graduates landed jobs with local vulnerabi... More

Integrating IoT With Blockchain: A Trust and Security Game Changer (IA)

In business today, gathering data and exploiting it is the name of the game. Data should be driving decisions and digital transformation. But, how can organisations tap into the in... More

Is Security-as-a-Service About to Have Its Day? (Tech HQ)

Cybersecurity is an expensive and complex ordeal. Attackers and the tools they use have become more sophisticated by the day, and as businesses increasingly move operations into th... More

Top 10 Practices for Securing Cloud Workloads (Akamai Blog)

Public cloud is one of the biggest challenges in every IT organization. While driving greater scalability, performance, and access for a competitive edge, it also introduces new se... More

Security Teams Can Be the Heroes of Digital Change (Thrive)

As rapidly as security teams are closing doors to attackers, businesses are opening others through initiatives in the cloud, the internet of things (IoT) and operational technology... More

Is More Talent Really the Answer to All Cybersecurity Concerns? (TechWire Asia)

Companies struggling with cybersecurity seem to believe that their biggest challenge is that they don’t have access to the right talent. That’s not true. Time and time again, r... More

The War for Cyber Talent Will Be Won by Retention Not Recruitment (Dark Reading)

Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.... More

For IT Decision Makers, Data Security, AI are Top Priorities (CMO)

For years companies have been talking the talk about replacing their organizational silos with more cross-functional collaboration. According to new research, it appears some are n... More

Infosys Opens New Cyber Defense Center in Romania (CDSA)

Infosys announced the launch of its state-of-the-art Cyber Defence Center in Bucharest, Romania. The Defence Center is an expansion of services delivered through the Infosys Digita... More

How to Better Defend Against Cyberthreats (ReadWrite)

2019 is half over, and cybercriminals are on the prowl. As internet, mobile, and IoT technologies become more pervasive, the vulnerable points that hackers can target have increase... More