Cybercrime

Cybercrime | News, how-tos, features, reviews, and videos

6 indirect expenses cost money fine penalty pepi stojanovski unsplash

Cybercrime is increasing and more costly for organizations

CIOs need to focus on people-based attacks and use intelligent tools to limit data loss and business shutdowns.

ransomware

How to respond to a ransomware attack

The worst has happened, you’ve fallen victim to a ransomware attack. Now what do you do?

aws_logo

3 ways Amazon can address its web service data risk – and what others can learn from it

Amazon may be facing a potentially data risk as third-party payment processors have been cited to be suspiciously getting sellers' Marketplace Web Service secret keys in the guise of integration.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

By 2020, 60 percent of digital businesses will suffer major service interruptions

The sheer number of cyberattacks resulting from an inability to manage risks — and the burgeoning talent shortage to deal with it — will force CIOs to rethink their defense strategy.

number five

5 ways to beef up your cyber defenses for 2019

Just because it looks like you might survive 2018 without a major cybersecurity breach, doesn't mean your company's all set for an air-tight 2019. Here's how to make sure you're prepared.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

login password - user permissions - administrative control

Best enterprise-grade password managers 2018

Southeast Asia is no stranger to data breaches. Here are eight password management solutions to help keep your enterprise secure.

8 authentication basics password identity protected security

Sheltered Harbor ensures cyber resilience for financial services firms

After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a...

insurance policy

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources make the investment worthwhile.

mutiple-exposure image of a world map, charts and graphs, and an aerial view of a city

United Nations blockchain pioneer prevents fraud of international aid payments

An interview with Joseph Thompson, co-founder and CEO of AID:Tech, and a winner of James Wolfensohn Game Changer Award and UN Sustainable Development Goal Pioneer 2017 for blockchain technology.

social media online presence profile user

Ad networks should be decentralized to make a better internet

Blockchain has the potential to resolve many of the issues facing ad networks, including the rampant fraud that is quickly, and unfortunately, becoming a central point of contention within the industry.

vulnerable balance egg risk breach security

How to be compliant with data breach notification laws

As a CIO, the bucks stops with you for matters pertaining to data breaches and compliance towards subsequent notifications.

1 ceo target threat

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

woman leader strong collaboration multi cultural diversity

Diversity and competency are not mutually exclusive

Emphasizing diversity does not mean you’re lowering your standards.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

outsourcing ts

Cybersecurity considerations for outsourcing software development

When it comes to outsourcing software development, you can never be too careful. Be sure to take thoughtful steps to protect your information assets, and protect the productivity gains that you realize through outsourcing. Learn how...

Man adding coin to web page on laptop

6 tips to pick the right ICO

ICOs are high-risk, high-reward investments. It’s important to know how much one is willing to invest and possibly lose before participating in one.

robots pc computers army desks work

Bandwidth as a service: The End of DDoS?

Blockchain-oriented firms have started to tackle the twin problems of website security and communication speeds. Thanks to its decentralized and heavily encrypted design, blockchain is ideally suited for protection.

Load More