Cybersecurity Matters

George Hulme lends his expert insight into the latest developments in cybersecurity

Survey: Formal Education Leaves Software Developers Short on Security

Computer Programming

Recently released research has revealed that formal software education does little to prepare developers for today’s DevOps teams. In fact, 76 percent of developers indicated security and secure development education needed for today’s world of coding is missing from formal curricula. The study, commissioned by Veracode and conducted by DevOps.com, surveyed nearly 400 DevOps professionals […]

Small mistakes, big data breaches

Keyboard Data

We all make mistakes, especially simple mistakes, such as a typo here and there in email or grammatical oversights in a report. And who hasn’t called or texted a wrong number?  Just this morning I tried to submit a web form, and it was rejected because I didn’t format a field input properly. These types […]

Seven hacker documentaries you can’t miss

code hacking

The Summer grinds toward its unofficial Labor Day end. The days are still long and hot. The humidity is thick. It’s a time of the year when I like to tuck myself indoors and catch up on movies I’ve missed and old favorites. One of my preferred subjects is hacking. And to get a sense of […]

Attention Apple users: New attack steals banking creds

Iphone security

A recently discovered malware targeting MacOS, named OSX/DOK, is now targeting unsuspecting Apple Mac users and attempting to steal their banking access credentials. The malware, initially discovered by researchers at Check Point Software Technologies, reportedly affects all versions of OSX, had a valid developer certificate, and targeted users via a widespread phishing attack. According to […]

Cyberattacks shut down more hospitals

Hospital

As enterprises infected with PetrWrap malware last week are still recovering, the impact of the malware hit some industries harder, and the only victims certainly weren’t virtual or data. This shows just how vulnerable the most vulnerable can be under such attacks. The attack resulted in hospital computers knocked offline, with some hospitals going fully […]

What we now know about “PetrWrap”

Cybersecurity

Dubbed PetrWrap, yet another wave of ransomware hammered organizations in Europe and the United States yesterday. And just as was the case with the WannaCry ransomware, or any ransomware attack for that matter, this widespread PetrWrap ransomware attack finds systems encrypted shortly after infection and the attackers demanding a ransom to be paid. Also just […]

Cloud-based security services set to soar

Security

According to research form Gartner, worldwide cloud-based security services will grow 21 percent this year, expected to reach $5.9 billion. Gartner expects the cloud-based security services market will approach $9 billion within the next three years, and grow at a pace that exceeds the total information security market. The top three priorities, according to Gartner: […]

Lack of clarity hinders cybersecurity insurance investment

data-protection DXC Blogs

Despite the increase in data breaches and their costs, many enterprise security professionals say their organizations don’t currently have cybersecurity insurance. But that may be changing. According to a recently released survey (registration required) commissioned by analytics software provider FICO, about 60 percent of respondents have some level of cybersecurity insurance. Add in those who say they […]

Healthcare industry still concerned about medical device hacking

A Ponemon survey released last week, Medical Device Security: An Industry Under Attack and Unprepared to Defend, shows that many in the healthcare industry still believe medical devices are primed for, and defenseless to, attack. While the study’s title smacks of hyperbole – medical devices are not coming under significant attack in the wild today (yet) […]

Negative consequences of IoT could extend beyond cybersecurity

Last week, the U.S. Government Accountability Office (GAO) published a 78-page technology assessment of emerging Internet of Things (IoT) technologies and their implications. Internet of Things: Status and Implications of an Increasingly Connected World was conducted at the request of Congress, and involved a review of current literature and expert input. Report authors named information security as […]