All Security articles – Page 21
-
Feature
COVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
-
News
Trickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
-
News
Former US security chief warns of increased cyber crime due to coronavirus
The former head of the US National Security Agency has warned that the coronavirus pandemic has significantly increased cyber risk, with companies likely to face a growing number of attacks.
-
Feature
Identifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Article
Police confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
Feature
Ensuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
-
News
Airbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
Feature
Preparing for the cybercrime challenge: tips from a former FBI agent
Few have witnessed the developments in cybercrime unfold over the past 20 years as closely as Jeff Lanza. The former FBI agent has followed the progression of white-collar crime since the 1980s and has seen first-hand how investigations went from being all about catching gangsters operating in the physical world, to catching online hackers in just a matter of years.
-
News
Zerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
Feature
Three things to consider when securing multi-cloud environments
Public sector organisations are all at different points on the cloud transformation and digitalisation journey.
-
Q&A
James Eaton-Lee, Head of Information Security and Data Protection Officer, Oxfam
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, PrivSec catches up with Oxfam’s James Eaton-Lee.
-
Feature
Security: more than just “tech”
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, independent cyber security consultant Dr Emma Osborn highlights the importance of owning cyber risk at board level.
-
News
Cyber attack linked to death of woman at hacked German hospital
A woman has died in Germany after a cyber attack at the Düsseldorf University Clinic (DUC) caused her to be turned away for emergency medical treatment at the hospital earlier in September.
-
Webinar
A New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
Feature
Don’t Lift and Shift: Evolve
At July’s Last Thursday in Privacy event, Sian John MBE, Microsoft’s EMEA / APJ director of cybersecurity strategy, gave companies transitioning to a cloud service model some food for thought. PrivSec’s Catherine Wycherley caught up with her to get some further insight.
-
News
A new role for the cybersecurity industry: Business Information Security Officer
Traditionally, those working in the cybersecurity industry have been technically savvy and laser-focused on tools and solutions. At a time when the whole enterprise – all its data and all its people – were safely housed in a corporate office and on the corporate network, this worked fine.
-
News
Hackers turn hunted in new AI-based cyber security deception tool
The University of Strathclyde has announced that researchers at its Centre for Intelligent and Dynamic Communications are working on a cyber security solution that uses AI and deception to protect network systems.
-
News
China announces global security standards initiative
China announced on Tuesday that it will launch an initiative to promote global data security in this area, Global Times reported.