Legislating IoT Devices, One Part of IoT Security Jigsaw

Legislating IoT Devices, One Part of IoT Security Jigsaw

|
Legislating IoT Devices, One Part of IoT Security JigsawBy Andy Norton, European Cyber Risk Officer The UK government recently announced that it is forging ahead with plans to legislate IoT devices and, crucially, it is bringing smartphone devices into this purview. The Department of Digital, Media and Sport (DCMS) cited ... Read More
The importance of (CSFs) Cyber Security Frameworks

The importance of (CSFs) Cyber Security Frameworks

|
The importance of (CSFs) Cyber Security FrameworksBy Andy Norton, European Cyber Risk Officer Since 2013 when President Obama signed Executive order 13636, new regulations and legislation have been implemented all around the world that mandate higher levels of cyber resilience from organisations that are deemed essential, critical, or hold Personal ... Read More
Watering Hole Attacks FI

Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is watering hole attacks. The name is derived from how predatory animals tend to lurk around watering holes waiting for their prey to come for a... The post Five High-Profile Watering ... Read More
IoT security FI

Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

It’s possible: Smart lighting could be the most dangerous element in your company’s network. By 2025, there will be 75 million IoT devices in use. Smart devices are now found throughout most commercial offices, yet a lack of security could make them ticking time bombs;... The post Can Smart Lighting ... Read More
digital security small business owners FI

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look only at the headlines, you’d probably think that digital attackers target just large... The post Think Your Business ... Read More
post-Brexit cybersecurity FI

Post-Brexit Cybersecurity – Implications on Risk and Uncertainty

Who knows what is going to happen with Brexit, or when the United Kingdom will officially leave the European Union, with a deal or not. (Although at the time I write these lines a delay or revoke of Article 50, the formal process of leaving,... The post Post-Brexit Cybersecurity – ... Read More
machine learning for cybersecurity FI

How Machine Learning for Cybersecurity Can Thwart Insider Threats

While there are innumerable cybersecurity threats, the end goal for many attacks is data exfiltration. Much has been said about using machine learning to detect malicious programs, but it’s less common to discuss how machine learning can aid in identifying other types of notable threats.... The post How Machine Learning ... Read More
cyberwar insurance risk management

The Asynchronous Nature of Asymmetric Cyberwarfare: Success Factors of Cyberattacks

Winning against an asymmetric cyberattack first requires we recognize an attack is occurring It has been given many names: soft war, non-linear war, unconventional hybrid warfare, cyber cold war, Cold War 2.0, Code War. Regardless of the name, one thing is certain: The way in which the internet is being ... Read More
Security Boulevard
phishing emails FI

Can You Stop Phishing Emails? Why What You’re Doing Now is Failing.

Phishing emails are not new. Despite broad coverage in the press, numerous corporate training programs, and many anti-phishing solutions, why are a massive 93% of data breaches still caused by phishing? With the average phishing attack costing a mid-sized company $1.6 million, this is not a... The post Can You ... Read More

Application Security Check Up