US wants to isolate power grids with 'retro' technology to limit cyber-attacks

US wants to isolate power grids with ‘retro’ technology to limit cyber-attacks

The US is very close to improving power grid security by mandating the use of “retro” (analog, manual) technologies on US power grids as a…

View More US wants to isolate power grids with ‘retro’ technology to limit cyber-attacks
Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks

Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks

Cybersecurity professionals are overworked and stressed out to such an extent that it threatens to provide hackers and cybercriminals with a better chance of conducting…

View More Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks
What is the cost of a data breach?

What is the cost of a data breach?

Data breaches and security incidents are becoming increasingly costly. Canadian lender Desjardins Group recently revealed it had spent C$70 million ($53 million) in the wake…

View More What is the cost of a data breach?
When asked about the New York Times report earlier on Monday, Kremlin spokesman Dmitry Peskov said: “...Undoubtedly this information shows the hypothetical possibility... and all signs of cyber war and military cyber action against the Russian Federation.” Peskov said unnamed strategic parts of the Russian economy had endured foreign cyber attacks many times in the past and that the authorities were constantly working to try to keep the economy and what he called sensitive parts of its safe.

Russia thwarts U.S. cyber attacks on its infrastructure: news agencies

Russia has uncovered and thwarted attempts by the United States to carry out cyberattacks on the control systems of Russian infrastructure, Russian news agencies cited…

View More Russia thwarts U.S. cyber attacks on its infrastructure: news agencies
What is Attack Surface Analysis and Why is it Important?

What is Attack Surface Analysis and Why is it Important?

This article describes a simple and pragmatic way of doing Attack Surface Analysis and managing an application’s Attack Surface. It is targeted to be used…

View More What is Attack Surface Analysis and Why is it Important?
Dark Web Becomes a Haven for Targeted Hits

Dark Web Becomes a Haven for Targeted Hits

Malware on the Dark Web is increasingly being customized to target specific organizations and executives. Malicious services offered on the Dark Web are more like…

View More Dark Web Becomes a Haven for Targeted Hits
How businesses plan to protect themselves against cyberattacks

How businesses plan to protect themselves against cyberattacks

Many organizations will spend more to shore up their defenses against cyber attacks this year, says business insurance provider Hiscox. Cyber attacks continue to rise…

View More How businesses plan to protect themselves against cyberattacks
The FBI Issues A Powerful $3.5 Billion Cybercrime Warning

The FBI Issues A Powerful $3.5 Billion Cybercrime Warning

The Federal Bureau of Investigation (FBI) has released the Internet Crime Complaint Center (IC3) “2019 Internet Crime Report.” For everyone but those engaged in cybercrime,…

View More The FBI Issues A Powerful $3.5 Billion Cybercrime Warning
DDoS: An Underestimated Threat

DDoS: An Underestimated Threat

Distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers. Here’s how to fight back. On the flip side of…

View More DDoS: An Underestimated Threat
The cost of cybercrime - in one graphic

The cost of cybercrime – in one graphic

Visualizing the massive cost of cybercrime What do Equifax, Yahoo, and the U.S. military have in common? They’ve all fallen victim to a cyberattack at…

View More The cost of cybercrime – in one graphic