YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

Analyst Angle: Why the standardization of IoT security cannot come soon enough

  IoT device manufacturers are governed by a keen consumer demand for desirable features and intuitive functionality. Security concerns, in stark contrast, have been given relatively little thought — especially among lower-end consumer IoT products. However, striking a more equitable balance between ease of use...

Five myths about the cloud

Cloud myths debunked Practically everyone in the West has heard of “the cloud,” but not everyone knows what it means. Even those who frequently use the cloud may have misconceptions about its risks and benefits. To put rumors to rest, here are some of the...

Five cybersecurity trends to watch

Cybersecurity in 2018 The year 2017 was plagued by cybersecurity disasters, from Verizon accidently leaking the names, phone numbers and PIN codes of as many as 14 million customers to Equifax exposing sensitive personal information of nearly half the U.S. population. The year 2018 isn’t...

Hackers using encryption to deter detection, finds Cisco cybersecurity report

Cisco releases 2018 Annual Cybersecurity Report Cyber criminals are increasingly using encryption to evade detection, while security professionals are becoming more reliant on automation, machine learning and artificial intelligence (A.I.). That is at least the conclusion of Cisco’s recently published 2018 Annual Cybersecurity Report, which involved...

Commercial buildings: The evolution from intelligent to smart (Reader Forum)

For commercial buildings in 2018, four trends define the evolution of networking technology that will drive buildings from just being intelligent to being smart: mobility, cybersecurity, low voltage power and workplace efficiency. These trends continue to influence the types of network infrastructure and devices...

Thales acquires Gemalto for $5.6 billion to advance digital security

Thales outbids Atos for Gemalto French aerospace specialist Thales outbid Atos for Dutch cybersecurity provider Gemalto. The company has agreed to purchase Gemalto for $5.6 billion, surpassing Atos’s bid valued at $5.06 billion. Gemalto is considered the world’s largest manufacturer of SIM cards and credit cards....

McAfee builds security portfolio with Skyhigh acquisition

McAfee announces intent to purchase Skyhigh Networks In an effort to build upon its security portfolio, McAfee announced Monday it intends to acquire Skyhigh Networks for an undisclosed amount. The deal comes fewer than eight months after the company was spun out from Intel as...

Cisco nods to government agencies with Interpol collaboration

Cisco, Interpol partner to combat cyber criminals worldwide Following a day after Amazon Web Services (AWS) unveiled its “Secret Region” cloud service for the U.S. Intelligence Community, Cisco announced it will share threat intelligence with the international police network Interpol in a joint effort to...

Cybersecurity skills shortage exacerbating data breaches

New report finds lack of cyber skills is increasing data security threats An acute shortage of security analysis, investigation skills, application security skills and cloud computing security skills is inflaming the number of data breaches, according to a recent report titled ‘The Life and Times...

Despite ongoing enhancement, cybersecurity risks continue to encroach

  Cybersecurity breaches are a much talked about but little-addressed problem for corporations today, as every hack reveals just how hard it is to stay ahead of a technically savvy, often criminal element. In fact, the problem is so extensive that a recent study by...

Hackers manipulating employees with social engineering, warns cybersecurity consultant

Hackers increasingly using phishing emails to trick employees, cautions cybersecurity expert It’s no secret cyber attacks are on the rise, but not all cyber attacks are created equal. Many cyber attacks are specifically targeted at employees who have access to sensitive company data, resources or...

Tech experts weigh in on lack of cybersecurity progress

Cyber Psychologist and Arm CEO probe cybersecurity challenges and opportunities Santa Clara, Calif. – Cyber Psychologist Mary Aiken alongside Arm CEO Simon Segars participated in a Q&A with New York Times Contributor Don Clark at Arm TechCon, discussing why more progress with cybersecurity hasn’t been made,...

Security problems hindering IoT potential, says Arm CEO

“Cybersecurity is a mess,” says Arm CEO Santa Clara, Calif. – While advances in computing are ushering forth a new era of tech, cybersecurity is a mess and will worsen if we don’t do something about it. That is at least the conclusion of Arm CEO...

Company cybersecurity investments underscored in Trend Micro report

New Trend Micro report highlights common tactics used by cyber criminals this year Trend Micro, a cybersecurity solutions company, released its “2017 Midyear Security Roundup: The Cost of Compromise” report, highlighting security threats for the first half of 2017. The company claims to have detected...

Benefits of cyber defense go beyond company security: Vodafone

Vodafone survey examines relationship between cyber defense and company success Vodafone released a new global survey highlighting the relationship between cyber defense and business success. According to the report, which included the responses of 1,434 security decision-makers, approximately 73% of companies believe information can serve...

Kaspersky Lab launches IoT scanner

The IoT launch occurs while the FBI is reportedly urging U.S. firms to stop using Kapersky Lab’s security solutions Kaspersky Lab has released a beta version of its solution for the smart home and the internet of things (IoT) - Kaspersky IoT Scanner. This free...

Dallas group focused on cybersecurity for a smart city

Cybersecurity specialists will focused on protecting infrastructure as Dallas pursues various smart city initiatives The Dallas Innovation Alliance (DIA), a public/private partnership focuses on the design and execution of a multi-phased smart city strategy for Dallas, announced Entegra Technologies has joined the alliance a its...

How to secure smart cities from cyber vulnerabilities

Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...

Reports: Reliance Jio deals with possible data breach

Reliance Jio says posted customer data is "unauthentic", but reports conflict Reliance Jio, India's fast-growing new market entrant with an LTE-only network, has reportedly been the subject of a massive customer data breach. The carrier said that the customer data was surfaced on the collection...

WISekey wins connected car contract with European manufacturer

The Swiss company will integrate its products in the manufacturer’s connected car solutions Swiss cybersecurity and internet of things (IoT) company WISeKey announced a contract with an unnamed European car manufacturer for development of connected car technology. The agreement includes the integration of the WISeKey IoT...

Report: Tech, telecom companies rank high as darknet targets

Owl Cybersecurity's Darknet Index puts Amazon as #1 Technology and telecommunications companies are among the companies which are most at risk for hacked data to end up on the web of private networks collectively known as the darknet, according to a recent report put together by...

Study: 48% of U.S. firms using IoT hit by security breaches

The report also showed that IoT breaches can cost up to 13% of the smaller firms´ annual revenues Nearly half of U.S. firms using an internet of things (IoT) network have been hit by a recent security breach, according to a study by consulting firm...

Bell Canada hack affects 1.9 million customers

Bell Canada hack involved mostly email addresses Email addresses, names and telephone numbers of about 1.9 million Bell Canada customers were illegally accessed by an anonymous hacker, the operator acknowledged on Monday. "There is no indication that any financial, password or other sensitive personal information was...

Reality Check: CSPs need to take a leadership role in securing IoT

Recent attacks show IoT devices are vulnerable, but what role to CSPs play in ensuring customer security? Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry share unique insights and experiences. Communications...