All Security articles – Page 24
- 
      
        
      
      WebinarCyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
 - 
      
        
      
      ArticleSocial housing provider Flagship Group suffers REvil ransomware attack
A provider of social housing based in the UK has suffered a ransomware attack by prolific phishing strain Sodinokibi, otherwise known as REvil.
 - 
      
        
      
      ebookFour Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
 - 
      
        
      
      ebookTackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
 - 
      
        
      
      Q&ANon-linearity, neurodiversity and the skills gap
A Q&A with UK Cyber Security Association founder Lisa Ventura
 - 
      
        
      
      ebookRansomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
 - 
      
        
      
      AnalysisTrust, privacy and combatting crime: the tech behind Singapore’s facial recognition ID scheme
Singapore is to become the first government in the world to grant citizens access to services online using facial verification and UK-based provider iProov has won the contract. FinCrime Report speaks to the firm’s founder Andrew Bud about the technology and issues of privacy, anti-money laundering, security and trust.
 - 
      
        
      
      WebinarA Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
 - 
      
        
      
      ReportIdentifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
 - 
      
        
      
      NewsUK releases details of Russian cyber attacks against Olympics and Paralympics
GRU, Russia’s military intelligence service, hacked officials and organisations involved in the planned 2020 Tokyo Olympic and Paralympic Games, the UK government has announced.
 - 
      
        
      
      FeaturePlease mind the (cyber skills) gap
Amid the furore around a withdrawn UK government-backed cyber skills advertisement this week, Privsec Report takes a look at the messaging and what it says about cyber security recruitment.
 - 
      
        
      
      FeatureCompliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations
 - 
      
        
      
      FeatureCOVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
 - 
      
        
      
      NewsTrickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
 - 
      
        
      
      NewsFormer US security chief warns of increased cyber crime due to coronavirus
The former head of the US National Security Agency has warned that the coronavirus pandemic has significantly increased cyber risk, with companies likely to face a growing number of attacks.
 - 
      
        
      
      FeatureIdentifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
 - 
      
        
      
      WebinarBuilding an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
 - 
      
        
      
      ArticlePolice confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
 - 
      
        
      
      FeatureEnsuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
 - 
      
        
      
      NewsAirbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
 









