Hidden risks with third-party software and how to mitigate those risks

Hidden risks with third-party software and how to mitigate those risks

Hidden risks with third-party software and how to mitigate those risks | 2020-11-27 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Suspected BEC scammers arrested following Interpol investigation

Suspected BEC scammers arrested following Interpol investigation

Three men have been arrested in Nigeria, suspected of being members of an organised cybercrime gang that has targeted over 500,000 government agencies and private sector companies around the world. The group, dubbed TMT by threat researchers at Group-IB, is said to have engaged in attacks against businesses since at least 2017, tricking company employees into opening malware-laced emails posing as purchase orders, product inquiries, and even updates related to the COVID-19 pandemic. If unsuspecting…

Read More

7 big data goals for 2021: AI, DevOps, hybrid cloud, and more

7 big data goals for 2021: AI, DevOps, hybrid cloud, and more

As you plan your big data strategy for next year, keep these seven goals in mind. Image: iStockphoto/metamorworks In 2021, corporate big data leaders will be looking to improve data quality and turnaround of big data projects, as well as performance in meeting business objectives. While 2020 hasn’t been a normal year for anyone, you still have to plan for the future and get ready for what may come. Here are seven key big data…

Read More

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night – Cyber Defense Magazine

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night – Cyber Defense Magazine

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a Mastercard Company Branches have now reopened, but many customers will continue to transact online and enjoy the convenience of banking in pajamas. In a recent NuData webinar with Aite Group’s Julie Conroy, she shared that, “one bank’s public investor filing says that 75% of their…

Read More

How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers and internal users as quickly as possible and at the lowest cost. Good security can be slow and expensive. Artificial intelligence (AI) and machine learning (ML) offer all the same opportunities for vulnerabilities and misconfigurations as earlier technological advances, but they also have unique risks. As enterprises embark on major…

Read More

Commercial construction company Webcor implements managed services to improve its security posture

Commercial construction company Webcor implements managed services to improve its security posture

Commercial construction company Webcor implements managed services to improve its security posture | 2020-11-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Emerging Public Cloud Security Challenges in 2020 and Beyond

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end of this year, up from $USD 227.8 billion just a year ago. Clearly, cloud computing is making its way to cloud nine, (See what I did there?) leveraging the sweet fruits of being in the spotlight for a decade. However, the threats to public cloud security are growing at the same rate.  Despite the optimistic…

Read More

Halting Hackers on the Holidays – Cyber Defense Magazine

Halting Hackers on the Holidays – Cyber Defense Magazine

Commentary As we approach major holidays, with Black Friday and Cyber Monday right around the corner and a massive increase in shopping for the Christmas season, we can count the breaches and total personally identifiable information records lost in the billions. According to Cyber Defense Magazine, someone loses their identity to a breach every two seconds. Every American has had an identity theft event happen in their life more than once by the time they reach the…

Read More

IT Governance Blog: 5 essential information security policies

IT Governance Blog: 5 essential information security policies

Information security policies are essential for tackling organisations’ biggest weakness: their employees. Everything an organisation does to stay secure, from implementing technological defences to physical barriers, is reliant on people using them properly. It only takes one employee opening a phishing email or letting a crook into the premises for you to suffer a data breach. Information security policies are designed to mitigate that risk by helping staff understand their data protection obligations in various scenarios. Organisations can…

Read More

Top 5 business sectors targeted by ransomware

Top 5 business sectors targeted by ransomware

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware. You may have heard me mention ransomware before. You know, the malware that locks up your systems and asks you to pay money in order to get them unlocked? You may think, since you’re not a finance company, that your business isn’t going to be targeted by ransomware and…

Read More
1 2,772 2,773 2,774 2,775 2,776 2,814