2016 Emerging Cyber Threats Report

Key Findings Digital dust, the complexity of connected systems, and espionage all compound against a shortfall of workers to demand bold new approaches to cybersecurity. Nearly two dozen  cybersecutity experts from Georgia Tech, business, government and defense, share their observations about emerging trends in a more connected world — where cyberattacks grow more persistent and sophisticated… Continue reading 2016 Emerging Cyber Threats Report

Rise of the IoT machines – How can enterprises protect themselves from DDoS attacks by IoT devices?

  By Stacy Collett | Follow Contributing Writer, CSO | OCT 25, 2016 12:00 PM PT Friday’s distributed denial-of-service attack on domain name service provider Dyn may have seemed like the end of the world for millions of Netflix, Twitter and Spotify users, but security professionals say the service disruption was merely a nuisance attack… Continue reading Rise of the IoT machines – How can enterprises protect themselves from DDoS attacks by IoT devices?

Is critical infrastructure the next DDoS target?

A massive Distributed Denial of Service attack shut down a portion of the internet recently. Experts say it is unlikely a similar attack could take down the grid or other critical infrastructure but acknowledge that security remains weak in the industry By Taylor Armerding | Follow CSO | NOV 16, 2016 3:17 AM PT The… Continue reading Is critical infrastructure the next DDoS target?

Hidden Fees: What is the Cost of a Data Breach?

JASON HART NOV 18, 2016 6:30am ET http://www.information-management.com/news/security/hidden-fees-what-is-the-cost-of-a-data-breach-10030300-1.html   Does anyone know the real cost of a data breach? This is a question that has been asked both in the board room and by researchers in the security industry ever since the first big data breaches began grabbing major headlines more than a decade ago.… Continue reading Hidden Fees: What is the Cost of a Data Breach?

Taking down the internet: possible but how probable?

Category: Uncategorized No Comments By Taylor Armerding | Follow CSO | OCT 6, 2016 3:00 AM PT   The hack of the Democratic National Committee this past summer, allegedly by Russia, prompted a political firestorm, but didn’t cause even a ripple in the US economy. But imagine the economic firestorm that would result if online attackers… Continue reading Taking down the internet: possible but how probable?

Dispelling Myths About Cyber Espionage

Corporate leaders might well wonder how to reconcile frequent global headlines about cyber espionage with last year’s unprecedented anti-hacking agreement by the Group of 20 largest economies. Current events, leaks, and reports from researchers have propelled press coverage of potential nation-state hacking, including a U.S. assessment that state-sponsored cyber spies stole political data leaked amid… Continue reading Dispelling Myths About Cyber Espionage

Keeping Watch Against Cyber Espionage

[vc_row][vc_column][vc_column_text] Keeping Watch Against Cyber Espionage By Christopher Castelli, Director; Adam Malone, Director; and Craig Stronberg, Director, PwC Posted on October 11, 2016 In Part 1 of this series, we looked at four myths around cyber espionage. In Part 2, we’re examining how companies can adjust to this evolving threat landscape. As state-sponsored hacking worldwide… Continue reading Keeping Watch Against Cyber Espionage

Certified Security by Design: Securing Devices in the IoT Era

Certified Security by Design: Securing Devices in the IoT Era October 10, 2016 In 2014, two tech professionals demonstrated that it was possible to remotely hack into a vehicle. They were able to gain full control of a Jeep Cherokee even with the driver inside. This is a terrifying prospect, and one that leads to… Continue reading Certified Security by Design: Securing Devices in the IoT Era

The Traveler’s Guide to Cybersecurity

The Traveler’s Guide to Cybersecurity October 24, 2016 Although you should always pay attention to your cybersecurity, when you travel for business, it is imperative to be even more vigilant about protecting your digital assets. When you are on the road, you are also responsible for safeguarding your organization’s property and information—and you’re slightly more… Continue reading The Traveler’s Guide to Cybersecurity