How to promote cyber security inside your company

Credit to Author: Roger Casellas| Date: Mon, 19 Nov 2018 11:55:54 +0000

As business are digitizing, companies get more and more vulnerable in front of cyberattacks. The numbers are impressive: in 2025 is expected to be 75 billion connected devices. Considering that… Read more »

The post How to promote cyber security inside your company appeared first on Schneider Electric Blog.

Read more

Compromising vital infrastructure: transport and logistics

Credit to Author: Pieter Arntz| Date: Tue, 06 Nov 2018 18:05:11 +0000

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: transport and logistics appeared first on Malwarebytes Labs.

Read more

Cyber-Attacks: How to Stop a Multibillion-Dollar Problem

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Mon, 05 Nov 2018 14:00:41 +0000

By Ed Cabrera, Chief Cybersecurity Officer for Trend Micro and Martin Bally, Vice President & Chief Security Officer for Diebold Nixdorf  Where there’s money, there has always been crime. Traditional bank robbery and physical assaults on ATMs are still a challenge, and now a new breed of cyber-enabled theft—using ATMs as the endpoint for cash-outs— has become a multibillion-dollar…

The post Cyber-Attacks: How to Stop a Multibillion-Dollar Problem appeared first on .

Read more

8 everyday technologies that can make you vulnerable to cyberattacks

Credit to Author: Kayla Matthews| Date: Thu, 09 Aug 2018 15:00:00 +0000

The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope.

Categories:

Tags:

(Read more…)

The post 8 everyday technologies that can make you vulnerable to cyberattacks appeared first on Malwarebytes Labs.

Read more

One year after Triton: Building ongoing, industry-wide cyber resilience

Credit to Author: Andrew Kling| Date: Wed, 08 Aug 2018 00:03:12 +0000

Cybersecurity Blog Series:  Part 1 One year ago cybersecurity experts discovered the world’s first known cyberattack on a safety instrumented system. Some called it Triton. Others named it TRISIS. Still… Read more »

The post One year after Triton: Building ongoing, industry-wide cyber resilience appeared first on Schneider Electric Blog.

Read more

Mingis on Tech: Lessons from RSA 2018

Credit to Author: Ken Mingis| Date: Wed, 09 May 2018 03:30:00 -0700

This year’s RSA Conference in San Francisco had a lot of ground to cover. Cybersecurity, of course. Fending off ransomware attacks. Building security best practices into employee training.

But, according to CSO’s Steve Ragan, the hottest topics at the 2018 conference were this month’s looming GDPR deadline and blockchain, blockchain, blockchain. (In fact, the two are often part of the same conversation.)

Ragan, who attended RSA, spoke with Computerworld Executive Editor Ken Mingis about what he learned, with a special focus on the May 25 GDPR deadline and what companies are scrambling to do to protect their data.

To read this article in full, please click here

Read more