Can cyber insurance cover acts of cyber terrorism ? |
Rough trade : Why financial markets will need to stay on top of their game |
How blockchain might make chatbots a more secure user interface |
The best way to connect with a distracted and time-crunched security buyer |
How kidney stones help us think better about implementing security |
Unsecured server exposes 157 GB of highly sensitive data |
Apache Tomcat Patches Important Security Vulnerabilities |
iPhone Hacking Campaign Using MDM Software Is Broader Than Previously
Known
|
Titan Security Keys – Google launches its own USB-based FIDO U2F Keys |
NetSpectre — New Remote Spectre Attack Steals Data Over the Network |
Egyptian ' Fake News ' Law Threatens Citizens with 5000-plus Followers |
New Bluetooth Hack Affects Millions of Devices from Major Vendors |
Google Bans Cryptocurrency Mining Android Apps From the Play Store | |
Computerweekly |
Information-managment |
Application attacks demand new security approach |
Code names and flowers : Rabobank ' s novel approach to protecting customer data |
Beyond GDPR : ePrivacy could have an even greater impact on mobile |
FDA issues guidance on how to use EHR data in clinical studies |
Cyber security – why you ’ re doing it all wrong |
In the wake of GDPR , college IT security programs need to evolve |
Cyber security vulnerability concerns skyrocket |
Phishing attack results in a breach and patient protection services at Texas anesthesia practice |
Dark web cyber crime markets thriving |
The first step in strong information security is to understand data assets |
ERP applications are under cyber attack , research confirms |
The top security and risk management trends facing organizations |
Ramp up security to mitigate Office 365 attacks |
Understanding risks to data drives controls efficiencies |
Ransomware concern drops despite being top cost | |
Securityboulevar |
ITSecurityguru |
“ YOU ARE HACKED ” Ransom Virus – Remove It and Restore Data |
Could complacency be setting in when it comes to ransomware ? |
5 Cryptojacking Consequences CISOs Can ' t Ignore |
Effort backed by Leading Bodies in the Field Aims to Support National Cyber
Security Strategy .
|
The 5 Common Mistakes Your Devops Team is Making |
Five common myths of SMBs when it comes to cyber security and online encryption |
Three C-Words of Web App Security : Part 1 – CORS |
IoT security – A barrier to deployment ? |
Was The Crystal Ball Crystal Clear ? Reflecting on 2018 Cybersecurity
Predictions
|
Protecting Data in the Era of IoT |
Why Penetration Testing and Assessments Should Include Real-World |
Supply Chain Attacks on the Rise as One of the Biggest New Threat Vectors as |
Scenarios |
Organisations Scramble to Close Gaps |
Techrepublic |
ETCISO |
50 +% of DevOps pros handle security , but they lack proper knowledge and |
Cybercriminals recall old vulnerabilities , using cameras & printers for DDoS |
skills |
attacks : Report |