The Security Standard to rule them all
Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard
Read more...Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard
Read more...Lateral attacks are a problem for the gaming industry, especially online games. Hackers use it not only to steal identities but to infiltrate corporate and
Read more...The recent ‘Five Eyes’ cybersecurity advisory underlines current concerns about the possibility of state-sponsored attacks. In particular, the guidance focuses on the risks faced by critical infrastructure providers.
Read more...Cyber resilience for transport and logistic supply chains
Read more...Often, the weakest link in cybersecurity is considered to be people, as 85% of successful cyberattacks involve some form of human element. Employees in accounting are highly vulnerable to these breaches.
Read more...The Biden administration warned in May that the freelancer you hired to code may be a North Korean spy. These cyber spies are posing as remote, contract IT workers and infiltrating malware into all forms of networks
Read more...Ransomware attackers are reliant on a business’ inability to recover. In this article, Christopher Rogers from Zerto explains what companies can do to prioritize recovery.
Read more...Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it
Read more...With seemingly no end to the growing problem of cyberattacks in sight, the cybersecurity industry is increasingly looking to address the root of the problem; humans.
Read more...Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.
Read more...