Cybercrime

Cybercrime | News, how-tos, features, reviews, and videos

number five

5 ways to beef up your cyber defenses for 2019

Just because it looks like you might survive 2018 without a major cybersecurity breach, doesn't mean your company's all set for an air-tight 2019. Here's how to make sure you're prepared.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

login password - user permissions - administrative control

Best enterprise-grade password managers 2018

Southeast Asia is no stranger to data breaches. Here are eight password management solutions to help keep your enterprise secure.

8 authentication basics password identity protected security

Sheltered Harbor ensures cyber resilience for financial services firms

After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a...

insurance policy

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources make the investment worthwhile.

mutiple-exposure image of a world map, charts and graphs, and an aerial view of a city

United Nations blockchain pioneer prevents fraud of international aid payments

An interview with Joseph Thompson, co-founder and CEO of AID:Tech, and a winner of James Wolfensohn Game Changer Award and UN Sustainable Development Goal Pioneer 2017 for blockchain technology.

social media online presence profile user

Ad networks should be decentralized to make a better internet

Blockchain has the potential to resolve many of the issues facing ad networks, including the rampant fraud that is quickly, and unfortunately, becoming a central point of contention within the industry.

vulnerable balance egg risk breach security

How to be compliant with data breach notification laws

As a CIO, the bucks stops with you for matters pertaining to data breaches and compliance towards subsequent notifications.

1 ceo target threat

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

woman leader strong collaboration multi cultural diversity

Diversity and competency are not mutually exclusive

Emphasizing diversity does not mean you’re lowering your standards.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

outsourcing ts

Cybersecurity considerations for outsourcing software development

When it comes to outsourcing software development, you can never be too careful. Be sure to take thoughtful steps to protect your information assets, and protect the productivity gains that you realize through outsourcing. Learn how...

Man adding coin to web page on laptop

6 tips to pick the right ICO

ICOs are high-risk, high-reward investments. It’s important to know how much one is willing to invest and possibly lose before participating in one.

robots pc computers army desks work

Bandwidth as a service: The End of DDoS?

Blockchain-oriented firms have started to tackle the twin problems of website security and communication speeds. Thanks to its decentralized and heavily encrypted design, blockchain is ideally suited for protection.

dark web hacker tablet malware

Widespread cybercrime costs reaching $11.7 million on average per organization

Overall, breaches have increased by 23 percent over the previous year, and demand a security approach that builds resilience from the inside out.

intro cyber attack maps

Fighting malware with P2P cyber protection

As new systems such as blockchain and P2P networks gain more widespread acceptance, the ways we deal with cybersecurity and malware attacks could evolve radically.

cyber attack virus meltdown

6 reasons why organizations need to boost their cyber-resilience

Despite skyrocketing cyber-security spending, 81% of CISOs still worry that data breaches remain unaddressed.

3 sensitive data hacker phone

Whose fingerprints are all over your customer data?

When compared to data warehousing, the data lake paradigm is incredibly appealing. But until you start working with the data, you don’t know what you don’t know. And that can be fatal.

Load More