More From Security – Page 20
-
News
Cyber attack linked to death of woman at hacked German hospital
A woman has died in Germany after a cyber attack at the Düsseldorf University Clinic (DUC) caused her to be turned away for emergency medical treatment at the hospital earlier in September.
-
Feature
Don’t Lift and Shift: Evolve
At July’s Last Thursday in Privacy event, Sian John MBE, Microsoft’s EMEA / APJ director of cybersecurity strategy, gave companies transitioning to a cloud service model some food for thought. PrivSec’s Catherine Wycherley caught up with her to get some further insight.
-
News
A new role for the cybersecurity industry: Business Information Security Officer
Traditionally, those working in the cybersecurity industry have been technically savvy and laser-focused on tools and solutions. At a time when the whole enterprise – all its data and all its people – were safely housed in a corporate office and on the corporate network, this worked fine.
-
News
Hackers turn hunted in new AI-based cyber security deception tool
The University of Strathclyde has announced that researchers at its Centre for Intelligent and Dynamic Communications are working on a cyber security solution that uses AI and deception to protect network systems.
-
News
China announces global security standards initiative
China announced on Tuesday that it will launch an initiative to promote global data security in this area, Global Times reported.
-
News
Norwegian Parliament in Cyber Attack
Norway’s parliament reported a cyber attack to police on 1 September which hacked the accounts of a number of MPs and members of staff.
-
Feature
The Great Digital Disruption: Adjusting to a New Normal in Cybersecurity
COVID-19 has forced societies, governments, businesses and individuals to suddenly rethink long-held practices and processes. This includes fundamental aspects of our lives, such as how and where we work, teach, learn, live and interact.
-
Feature
The Risks of Checkbox Compliance
A key principle of the GDPR is that personal data must be processed securely, using “appropriate technical and organisational measures” – the “security principle”. To meet this principle, organisations implement a variety of IT security technologies, all aimed at protecting information where it is stored and processed.
-
News
Uber former security chief charged in connection with attempted data breach cover-up
The US Department of Justice has charged Joseph Sullivan, former chief security officer at Uber, with obstruction of justice following a data breach.
-
Article
4,500 successful daily cyber attacks on UK SMEs
An estimated 65,000 attacks are carried out on UK SMEs every day resulting in 4,500 breaches, a report has highlighted.
-
Video
Is Brazil Leading the way in making Data Protection a Fundamental Right?
The Brazilian General Data Protection Law (LGPD) will apply from 15 August and will cover both public and private sectors. It requires all organisations large and small to abide by the same standards and regulations. In addition, a recent Supreme Court ruling (regarding telecoms companies sharing more than 200 ...
-
Video
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Video
Faking It - Combatting Email Impersonation with AI
Hosted by: Mariana Pereira (Director of Email Security Products, Darktrace) Video: Faking It - Combatting Email Impers…
-
Video
Avoiding the Ransomware Rampage – 5 Key Steps to Staying Secure
Hosted by: Timo Weberskirch (Sales Engineer, Quest KACE) Video: Avoiding the Ransomware Rampage – 5…
-
Video
Data Protection and Cyber Security in Flux Across the GCC
Hosted by: Nick O’Connell (Partner, Head of TMT – KSA), Vivienne Artz, (Global Chief Privacy Officer, Refinitiv), Noriswadi Ismail (Managing Director – Technology, Privacy and Cyber Risk Advisory), Ryan Rubin (Senior Managing Director, Ankura) Video: Data Protection and Cyber Security ...
-
Video
Avoiding the Security Dangers with Work From Home (WFH)
As more and more office workers find the new normal to be work from home (WFH) there are challenges and dangers that come into play, with 90+% cyber security attacks beginning with email.
-
Video
Creating a Global Program in an Evolving Landscape
With the ever-changing landscape of data protection, organisations have the task of ensuring their privacy program is adaptable to current and future data privacy regulations across the world.
-
Video
How to Minimise Insider Threats in Cyber Security
Insider threats, whether they are from negligence or those with malicious intent, can pose a significant risk to all organisations. Research from Ponemon Institute reveals that the average cost of insider incidents is almost double the average breach, therefore, companies face a much larger threat from workers than from outside.
-
Video
Ransomware Protection - More Than Just Backup
Hosted by: Adrian Moir (Sr. Consultant, Product Management, Quest Data Protection) Video: Ransomware Protection - More Than Just Backup
-
Feature
Security Concerns over Contact Tracing Apps
When an individual is found to be infected with the coronavirus, the race is on to find those who they have come into contact with, as these people could be carriers or even be infected. This has led to hundreds of coronavirus contact-tracing mobile applications being developed worldwide and backed by various governments and national health authorities, as well as guidelines by the EU and special protocols developed by the two major smartphone OS vendors Apple & Google. In some places, the usage of such applications has been made mandatory for people who want to gain access into public spaces.