Lack of Political Leadership in UK Jeopardizes Cyber Security of Critical Sectors, Report Says

The lack of political leadership to face targeted attacks is contributing to the poor job the UK is doing on its national security strategy, says a UK government report discussing the cyber security of the nation’s critical national infrastr… Continue reading Lack of Political Leadership in UK Jeopardizes Cyber Security of Critical Sectors, Report Says

Strengthening Industry Collaboration Through the Charter of Trust for a Secure Digital World

Under the Charter of Trust, limiting the impact of digital transformation and cybersecurity and building trust for users has to be the result of close collaboration at all levels.

The post Strengthening Industry Collaboration Through the Charter of Trust for a Secure Digital World appeared first on Security Intelligence.

Continue reading Strengthening Industry Collaboration Through the Charter of Trust for a Secure Digital World

Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

These days, many electronics companies deploy industrial IoT technologies without evaluating or protecting against cybersecurity risks, or preparing a fast and effective response to a breach.

The post Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments appeared first on Security Intelligence.

Continue reading Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

The State of Automotive Industrial IoT: Are Auto Companies Secure?

Industrial IoT technologies promise to revolutionize the automotive industry, but they also introduce new risks. What are the biggest threats auto companies face, and how can they mitigate them?

The post The State of Automotive Industrial IoT: Are Auto Companies Secure? appeared first on Security Intelligence.

Continue reading The State of Automotive Industrial IoT: Are Auto Companies Secure?

Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking

Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.

The post Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking appeared first on Security Intelligence.

Continue reading Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking

What’s Holding Back GDPR Compliance Efforts?

Organizations can fast-track their GDPR compliance efforts by focusing on three crucial areas: awareness and understanding; accountability and responsibility; and resources and support.

The post What’s Holding Back GDPR Compliance Efforts? appeared first on Security Intelligence.

Continue reading What’s Holding Back GDPR Compliance Efforts?

Elevating Education on the Security and Resiliency Campus at Think 2018

Think 2018 offers attendees unique opportunity to interact with IBM experts, view hands-on demonstrations of cutting-edge technologies and tackle today’s top security issues.

The post Elevating Education on the Security and Resiliency Campus at Think 2018 appeared first on Security Intelligence.

Continue reading Elevating Education on the Security and Resiliency Campus at Think 2018

All Aboard! Applying the Security Immune System Approach to the Railroad Industry

When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.

The post All Aboard! Applying the Security Immune System Approach to the Railroad Industry appeared first on Security Intelligence.

Continue reading All Aboard! Applying the Security Immune System Approach to the Railroad Industry

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.

The post Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges appeared first on Security Intelligence.

Continue reading Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security

The IBM Security immune system consists of integrated, industry-focused solutions to help clients across all sectors maximize their security investments.

The post IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security appeared first on Security Intelligence.

Continue reading IBM Experts Weigh In on the Value of an Industry-Focused Approach to Security