IoT explodes worldwide, researchers investigate security issues present in the devices real users own

About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, bringing with it an associated growth in cybersecurity risks. The findings have been… Continue reading IoT explodes worldwide, researchers investigate security issues present in the devices real users own

How to add security to digital transformation processes

In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about adding security to digital transformation processes. Here’s a transcript of the podcast for your convenience. Hello everybody. My na… Continue reading How to add security to digital transformation processes

Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks

Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at their navigation systems, according to research from Regulus Cyber. Staged attack caused the car to veer off the main road During a test drive using Tesla’s Navigate … Continue reading Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks

Regulation readiness: Embracing the privacy legislation wave ahead

There are a few certainties in life. Your attempt to use the fifteen-item express checkout line with sixteen items will be denied by the seventeen-year-old cashier. The motorcycle cop will write you a $150 ticket instead of warning for going just three… Continue reading Regulation readiness: Embracing the privacy legislation wave ahead

Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Recently messaging applications got hit hard with vulnerabilities, hacking attempt disclosures by nation-states and insider employee inappropriate behaviors. As organizations continue to prioritize cybersecurity, outfitting their infrastructure with th… Continue reading Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Why phishing education has never been more critical to your business

Our cyber defenses are becoming stronger and stronger every year. Even the smallest companies can now deploy advanced anti-malware and intrusion detections tools that were, until recently, only within the reach of larger enterprises. Today, sandboxed b… Continue reading Why phishing education has never been more critical to your business

What does runtime container security really mean?

End-to-end protection for containers in production is required to avoid the steep operational and reputational costs of data breaches. As news of container attacks and fresh vulnerabilities continues to prove, short cuts (or incomplete security strateg… Continue reading What does runtime container security really mean?

Ransomware disrupts worldwide production for Belgian aircraft parts maker

ASCO Industries, a manufacturer of aerospace components with headquarters in Zaventem, Belgium, has been hit with ransomware, which ended up disrupting its production around the world. The attack reportedly started on Friday and the extent of the inter… Continue reading Ransomware disrupts worldwide production for Belgian aircraft parts maker

GDPR implementation lessons can help with CCPA compliance

The ever increasing number of data breaches has made consumers more aware of how their data is being used and has emphasized the importance of keeping personal data private, says Sovan Bin, CEO and founder of cloud data management firm Odaseva. “… Continue reading GDPR implementation lessons can help with CCPA compliance

CISO do’s and don’ts for board reporting

Security is no longer just a job for IT – it impacts all areas of a business, from brand perception to the bottom line. As a result, CISOs are increasingly being asked to deliver cybersecurity reports to their boards, including information on global tr… Continue reading CISO do’s and don’ts for board reporting