NIS2 and the chain liability’s impact on Secure Software Development
If you are a software supplier and your customer is covered by the EU NIS2 directive, you might very well
Read moreIf you are a software supplier and your customer is covered by the EU NIS2 directive, you might very well
Read moreIt’s -30 Celsius in December. An entire city has gone dark. There is no electricity, heating, internet, or telecommunications—all because of one malicious email that now holds the city ransom for its data in exchange for some bitcoins. The truly alarming prospect is that this nightmarish scenario can hit any and every major city globally. In a race to digitally transform businesses, institutions, and governments cannot ignore these Trojan horses that have the potential to bring them to their knees. With data being touted as the new oil, it takes a proactive strategy to keep any organization’s wealth of stored data well protected, yet accessible, to the internal networks that need it. This has sparked tech giants like Apple, Google, IBM, and Amazon to offer cybersecurity solutions and rev their market ad campaigns on data, privacy, and security amidst waves of digital transformation. The fact is, for any element of a business to transform with new technology, that technology must be backed by an equally transformed security posture. Without it, vital data is put at risk. For organizations to successfully transform to meet standards set by today’s tech leaders, it requires fundamental knowledge of what cybersecurity is and what it isn’t.
Read moreTechnology is ever on the march to the future and with it comes more sophisticated and persistent cybercriminals.The digital arms
Read moreCybercriminals are increasingly hacking industrial control systems to profit off the widespread adoption of new technologies with weak cybersecurity. Industry
Read moreName: Kirsty Paine Affiliation: Splunk Can you briefly introduce your current role in cybersecurity? As Strategic Advisor in Technology &
Read moreDigital forensics and incident response (DFIR) are a routine part of ensuring the business has a good security posture. Investigations
Read moreFirmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –
Read moreThe supply chain sector has always been a magnet for theft and fraud, but these risks multiply in the age
Read moreA comprehensive cybersecurity strategy involves data recovery now more than ever. A solid plan could save organizations from the most
Read moreIn the wake of sophisticated and expensive network security measures, protecting the lowly email server often gets missed. However, attackers count on this and have made even greater inroads into an already lucrative route for malware. Verizon’s 2022 Data Breach Investigations Report notes that email is still one of the two top delivery methods for malicious payloads, and the median organization receives three out of four malware payloads in this way.
Read more