More Protective Security Content – Page 14
-
WebinarA Post-Brexit Perspective: Managing Personal Data Breaches
Brexit will have a profound effect on how UK businesses address their privacy programs. Faced with new challenges for maintaining data transfers across Europe, organizations need a proactive plan in place to manage personal data breaches. Because of this, organizations are asking questions like when can you rely on the one-stop shop mechanism?
-
NewsCyber attacks hit Australian government and broadcaster
Some Australian government systems were shut down and the country’s Channel Nine TV station went off the air temporarily after cyber-attacks over the past three days. It is unclear if the incidents are connected.
-
NewsEU Council adopts cyber security strategy
The Council of the European Union has agreed to the European Commission’s proposed cyber security policy for the digital decade ahead.
-
AnalysisSeven key themes from PrivSec Global Day One
Here are the talking points and takeaways from Day One of PrivSec Global
-
NewsTwo arms of Australian government at risk of cyber attack
Australia’s prime minister and cabinet office and attorney-general departments are vulnerable to cyber security incidents because they have not fully implemented key mitigation strategies, auditor-general Grant Hehir has warned in a report.
-
NewsUK’s NCSC issues first ever cyber security warning to nurseries
The National Cyber Security Centre (NCSC) in the UK has warned that pre-schools, nurseries and childminders are increasingly an “appealing target” for cyber criminals and is encouraging them to bolster their defences.
-
NewsCamera firm Verkada outlines security overhaul after hacking of 150,000 feeds
The co-founder and Chief Executive of security camera company Verkada has announced a series of actions to overhaul its security after 150,000 of its devices were hacked.
-
NewsHackers access live feeds ‘from 150,000 surveillance cameras’
A group of hackers says it has breached security systems and viewed live feeds from 150,000 surveillance cameras supplied by Verkada to general and psychiatric hospitals, women’s health clinics, police stations, prisons, schools and companies, including car maker Tesla and software provider Cloudflare.
-
NewsMcAfee sells enterprise arm for $4bn to focus on consumer business
Anti-virus software producer McAfee has agreed to sell its enterprise business to a consortium led by private equity firm, the Symphony Technology Group (STG), for $4.0bn (€3.33bn).
-
AnalysisThe Internet of Things: strategic principles and best practice
The rise of the Internet of Things (IoT) presents new security challenges and risks. Ahead of his appearance at PrivSec Global, Arun DeSouza answers questions on how to ensure your IoT strategies are up to date and effective.
-
NewsMcAfee hits back after being charged with fraud and money laundering conspiracy over cryptocurrency promotion
The anti-virus software pioneer John McAfee has hit out after being charged with fraud and money laundering crimes in the United States.
-
NewsCyber-attack compromises data of hundreds of thousands airline passengers
Data has leaked from air transport communication and IT company Sita following a cyber-attack on its US-based Passenger Service System (PSS) which operates passenger processing systems for airlines.
-
NewsUS mortgage lender agrees to pay $1.5m penalty after failing to report cyber breach
Residential Mortgage Services (RMS) has agreed with New York state’s Department of Financial Services to pay $1.5m after failing to report a cyber breach.
-
NewsMalaysia Airlines passengers’ data compromised for almost a decade
Personal details of Malaysia Airlines’ Enrich frequent flyer programme members were exposed in a security breach via a third-party IT service provider lasting from March 2010 through to June 2019, it has emerged.
-
NewsSingapore sets up programme to combat supply-chain cyber risk
The government in Singapore is to set up a programme to help organisations who run the city state’s critical information infrastructure (CII) to better manage their supply chain’s cyber-security risks
-
NewsChina-linked cyber group ‘targeted Indian power sector’
An investigation by US cyber-security company Recorded Future has found a cyber-campaign by RedEcho, a threat activity group with links to China, targeted the Indian power sector.
-
NewsOxford University confirms cyber incident at Covid-19 research lab
Oxford University has confirmed reports of a cyber incident at a research laboratory that is researching how to counter the Covid-19 pandemic
-
NewsUkrainian agency links cyberattack on government to Russia
The National Security and Defence Council (NSDC) of Ukraine believes Russian hacker-spy group Pterodo/Gamaredon is behind a cyberattack on a Ukrainian government file-sharing system.
-
NewsData of 3.3m cash-loan app users ‘sold online’
Email addresses and other information about 3.3m clients of money-lending app Cashalo in the Philippines is being offered for sale on the dark web, a preliminary investigation by the Philippine National Privacy Commission (NPC) has shown.
-
ebookThe Key Pillars for Protecting Sensitive Data
Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. While this is still important, it is not enough.


