Enter your keyword

Tags: cyber attack

6 Malware On Your USB

6 Malware On Your USB

Are you carrying a loaded cyber weapon?   Most of us know better than to use a USB stick that has been conveniently left somewhere. But even the most informed aren’t always careful. Would you be suspicious of a USB handed as a prise during a cyber security expo? “People see these things as nothing

Israel: Cybersecurity Recipe

Israel: Cybersecurity Recipe

4 Ingredients That Make Israel a Cybersecurity Powerhouse.   With more start-ups and tech professionals per capita than any other country, it is no question that Israel is a booming cyber-tech hub of innovation. But how does a country with a population roughly the same as that of New York City -and a limited budget-

IIoT Europe at IBM Watson HQ

IIoT Europe at IBM Watson HQ

IIoT has convinced the world of its unprecedented opportunities for businesses –in fact, it is a game changer for the Industrial Sector, reducing costs and improving efficiency in ways we didn’t dare dream of just a few years ago. But for the investment in digital innovations to be optimised, business models must be adjusted, and

CS4CA MENA 2019 Overview

CS4CA MENA 2019 Overview

CS4CA MENA: Government Officials & 100+ Industry leaders Discuss Cyber Security.   Understaffing and underinvestment place ICS security under constant risk in the MENA region, with over 40% of the region’s ICS computers facing cyber-attacks every semester [Kaspersky]. Several industries suffer the consequences of this cyber crisis: Transport & Logistic companies dread the reputational damage

Norwegian Cyber Security

Norwegian Cyber Security

NorSIS urges Norwegians to boost their cyber security awareness.   Norway ranked 4th in preparedness for the new digital economy by the World Economic Forum in 2016, and is indeed one of the most digitised countries in the world today. But for Norwegians to reap the rewards of being highly digitised and connected, safety needs

Feature: Jason, CISO at PAS

Feature: Jason, CISO at PAS

There’s No Technological Panacea to Save ICS From Cyber Threats- You Need Strong Foundations.   “We’re chronically late to the party” starts Jason on stage “…because we’re still trying to learn the lessons from the last 10-15 years, while our adversaries are out there innovating.” He’s at CS4CA Europe 2018, speaking about securing industrial control

Gaining Employee Compliance

Gaining Employee Compliance

Seven Ways To Gain Employee Compliance On Cybersecurity Procedures. Cybersecurity is an absolute necessity for keeping customer information, as well as more general company data, safe. Without it, your business is exposed to a range of threats that can cost you thousands when recovering information — or cost you even more in customer trust. Cybersecurity

Is the IT-OT bridge the Achilles’ heel of industrial cyber security?

Is the IT-OT bridge the Achilles’ heel of industrial cyber security?

Operational technology (OT) is the beating heart of the critical infrastructures supporting our life standards. As infrastructures become increasingly elaborate, interconnected, and co-dependent, their disruption can afflict entire populations. This isn’t new. In fact, the importance of protecting OT systems has been recognised for decades. What is surprising, however, is that many businesses still lack

Budgetary Foresight for 2019

Budgetary Foresight for 2019

Fall brings an annual budgetary exercise for which many mid-level managers and executives will be unprepared. Unfortunately, according to Willis-Tower-Watson, “Among executives, there is little consensus on how to allocate cyber budgets” – but very close responses were given between “technology to harden cyber-defenses” and “IT talent acquisition and skills training/development.” Be ready for 2019

Pin It on Pinterest