Ukraine’s top security official to keynote IRISSCON 2023 conference

The Deputy Chairman of Ukraine’s technical security and intelligence service will give the keynote address at this year’s IRISSCERT cybersecurity conference, IRISSCON, in Dublin’s Aviva Stadium on Thursday, 16 November. Victor Zhora, Deputy Chairman of… Continue reading Ukraine’s top security official to keynote IRISSCON 2023 conference

Google is calling EU cybersecurity founders

Google announced that the Google for Startups Growth Academy: Cybersecurity program now accepts applications from EU companies. The three-month program, announced last fall, will start in April and connect the finest of Google with the top European cyb… Continue reading Google is calling EU cybersecurity founders

A look at the 2021 CWE Top 25 most dangerous software weaknesses

The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two calendar years. These weaknesses are risky because they are many times easy to find… Continue reading A look at the 2021 CWE Top 25 most dangerous software weaknesses

1 in 5 companies fail PCI compliance assessments of their infrastructure

According to a recent poll by SentryBay, the infrastructure of over 21% of surveyed companies has failed key PCI compliance assessments, designed to assist them to maintain high security standards when processing customer card payments. In addition, a … Continue reading 1 in 5 companies fail PCI compliance assessments of their infrastructure

What are the most common cybersecurity challenges SMEs face today?

Small and medium-sized enterprises (SMEs) are considered to be the backbone of Europe’s economy. 25 million SMEs are active in the EU, and employ more than 100 million workers. ENISA identified the cybersecurity challenges SMEs face today and iss… Continue reading What are the most common cybersecurity challenges SMEs face today?

Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack

Armis today announced the discovery of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) and used in Cisco, Meraki and Aruba wireless access points, called Bleedingbit. If exploited, they allow an unauthent… Continue reading Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack

IoT security: Lessons we can learn from the evolution of road safety

I was recently chatting with my father about his life as a young boy growing up in rural Ireland in the middle of the last century, and the conversation moved onto cars and how when he was young cars were a relatively new technology. In the world we kn… Continue reading IoT security: Lessons we can learn from the evolution of road safety

Brian Honan, BH Consulting – Enterprise Security Weekly #84

John Strand holds down the fort and interviews Brian Honan who is recognised internationally as an expert on cybersecurity! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
The post Brian Honan, BH Consulting – Ente… Continue reading Brian Honan, BH Consulting – Enterprise Security Weekly #84