5 minutes with Jane Lee – The fraud supply chain, cyberattacks and more

5 minutes with Jane Lee – The fraud supply chain, cyberattacks and more

5 minutes with Jane Lee – The fraud supply chain, cyberattacks and more | 2021-03-31 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Iranian hackers targeting US, Israeli medical researchers: analysis

Iranian hackers targeting US, Israeli medical researchers: analysis

A hacking group associated with the Iranian government targeted senior medical researchers in the U.S. and Israel over the past few months, new research released Wednesday found. Cybersecurity group Proofpoint found as part of its report that the Iranian hacking group, known as “Phosphorous” or “Charming Kitten,” had begun targeting around 25 medical professionals in the fields of genetic, neurology and oncology research in both the U.S. and Israel in December. The Iranian hackers went…

Read More

Attackers Target Medical Research Staff with Credential Phishing Attacks

Attackers Target Medical Research Staff with Credential Phishing Attacks

By Jessica Davis March 31, 2021 – Senior medical research personnel in the US and Israel are being targeted by a credential phishing campaign launched by a nation-state hacking group with ties to Iran, according to a new Proofpoint report. Proofpoint observed the hacking group known as TA453 targeting about 25 senior professionals at a range of medical research organizations in the US and Israel. The targeted workforce members were extremely senior personnel with backgrounds in…

Read More

NHS Reduces Cyber-Skills Shortages but Breach Problems Remain

NHS Reduces Cyber-Skills Shortages but Breach Problems Remain

The NHS appears to have narrowed the cybersecurity skills gap slightly over the past two years, although breaches remain a serious challenge, according to the latest data from Redscan. The managed security service provider published an analysis of Freedom of Information (FOI) requests sent to the health service last year and compared it to information gathered in 2018. On average, trusts now have nearly twice as many employees with professional IT security qualifications: the figure…

Read More

Understanding the Role of Encryption in GDPR Compliance

Understanding the Role of Encryption in GDPR Compliance

Encryption has been a hot topic of discussion during the implementation phase of most data privacy laws. In the age where organizations are dealing with large volumes of data each day, the protection of this sensitive data is critical. The data, which is seen as a business-critical asset for organizations, should be protected against malicious hackers looking for opportunities to steal the data. For these reasons, most data privacy regulations call for organizations to encrypt…

Read More

Bitcoin Soars but Will Security Risks Spark Greater Regulation?

Bitcoin Soars but Will Security Risks Spark Greater Regulation?

By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after roaring past American Express. This remarkable growth has led to Bitcoin breaking through the $20,000 level for the first time and even more organizations are accepting digital currency in their transactions as crypto hurtles towards the mainstream. Regrettably, entirely avoidable hacking incidents such as that…

Read More

A Birthday Challenge as Docker Turns 8 – Docker Blog

A Birthday Challenge as Docker Turns 8 – Docker Blog

Time flies. Eight years ago Docker was introduced to the world and forever changed the way applications are developed. We have enjoyed watching developers from all walks of life and from every corner of the globe bring their ideas to life using our technology.  As is our tradition in the Docker community, and as announced during our last Community All-Hands, we are celebrating Docker’s big day with a birthday challenge where Docker users are encouraged to…

Read More

What is cyber risk quantification, and why is it important?

What is cyber risk quantification, and why is it important?

One way to get C-level managers and cybersecurity department heads on the same page is to employ cyber risk quantification, as it speaks to costs versus risks. Image: iStockphoto/anyaberkut It’s a reasonably safe bet cyber incidents will be more of the same in 2021. However, there is something different blowing in the cyber wind this year. Business leaders are asking those in charge of cybersecurity departments to relate monetary costs to each potential cybersecurity risk…

Read More

Coding for robots: Need-to-know languages and skills

Coding for robots: Need-to-know languages and skills

KODA advising CTO John Suit discusses the skills and languages that are important for developers who want to build software and systems for modern robots. Robots come in all shapes and sizes, but typically, they’re autonomous devices that operate on their own to help us complete a task. If you’re a developer looking to get into the growing field of robotics, what are the right skills to have? What languages should you know? In this…

Read More
1 3,678 3,679 3,680 3,681 3,682 3,761