This year's Black Hat Europe conference in London features dozens of briefings touching on a wide variety of topics, including exploiting contactless payment and Bluetooth vulnerabilities, identifying vulnerable OEM IoT devices at scale and running false-flag cyberattacks.
IoT, the cloud, advancements in AI, regulatory fines, third-party risk, cyber fraud - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But how about the new demands on cybersecurity leaders? What new skills, tools and strategies are needed to understand, quantify and manage...
Google has directly warned more than 12,000 users across 149 countries that they have been targeted by government-backed hackers. Google says the attack attempts occurred in the third quarter of this year and targeted users of such services as Gmail, Drive and YouTube.
An audit from the U.S. Energy Department's Inspector General finds that the agency is prone to making the same cybersecurity mistakes year-after-year. This includes exposing critical infrastructure, including nuclear facilities, to outside hacking and attacks.
All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.
T-Mobile says it suffered a breach of prepaid accounts as a result of unauthorized access to its systems. The exposed data includes names, billing addresses, phone numbers, account numbers, rate plans and more.
The FCC voted unanimously Friday to ban telecommunications companies from using FCC funds to buy equipment from Chinese manufacturers Huawei and ZTE because they pose a "national security threat." Also under consideration is a plan to rip and replace equipment from the firms.
The Periodic Table of Data Protection maps the data protection
modernization journey of enterprises and explains the complexities of
data protection in an organized and structural format. IT pros and
business IT users can leverage on it to assess gaps in protecting their
data capital in the areas of backup and...
Welcome to The Periodic Table of Enterprise Data Protection. It maps the data protection modernization
journey of enterprises and serves to explain the complexities of the subject matter in an organized and
structural format. It also provides a stark comparison between traditional data protection and the various use...
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.
The modern digital economy is built on a foundation of trust, which is becoming increasingly more fragile and vulnerable to risks that we are just starting to understand. Digital technologies are a force for progress. Yet, they are also a source of distrust in the very technology that is intended to drive that...
The long-awaited Personal Data Protection Bill is ready to be tabled in Parliament during this winter session. Organizations across geographies are still struggling to understand the nuances of the European Union's General Data Protection Bill and the California Consumer Protection Act.
Indian enterprises are...
Discover why medical devices, legacy systems and IoT in healthcare are this year's biggest security threats.
The Internet of Medical Things (IoMT) has disrupted the future strategy of healthcare organizations and market segments as we know it. Security breaches have become a major concern for providers, and with...