Healthcare survey finds abundance of medical device security overconfidence

overconfident-shadow

When facing a determined adversary, it’s one thing to be confident, it’s quite another to be overconfident. But that’s what a new survey of healthcare IT professionals and biomedical engineers found: an overabundance of confidence when it comes to connected medical device security. According to the 2018 Zingbox Second Annual Connected Medical Device Survey, respondents believe […]

Cyberattack biggest threat against U.S. financial system

stock-market-ticker-reflection-in-window

When asked during congressional testimony last week, Federal Reserve Chairman Jerome Powell, who was appearing in front of the House Committee on Financial Services, told lawmakers that the number one threat to the stability of the U.S. financial system is its ability to respond and mitigate a large-scale cyberattack against the financial system. “The clear […]

How application security testing needs to change in an agile, DevOps world

security-text-on-screen

In today’s dynamic cyber-attack landscape, a robust security strategy that looks at all attack surfaces is critical. Enterprises must tirelessly assess their current state of readiness and continually improve governance and processes to stay a step ahead of malicious actors. Applications are one of the preferred attack vectors with up to 90% of successful breaches […]

Enterprise security lessons for Meltdown and Spectre defence

computer-chip

Media panic was at a fever pitch last week with news of the Meltdown and Spectre cyber security flaws.  This is another high profile cyber security event that enterprise organisations will have to manage over the next several months. This is not, however, a repeat of the Wannacry and Not Petya incidents we saw during […]

Successfully defending against social engineering attacks

helmet-and-shield-armor

While it’s the technical aspects of cyberattacks that often make headlines — software exploits, worms, ransomware, and other forms of malware — it’s actually the subversion of people (end users) that make many, if not most attacks today, successful. All attacks eventually involve technical aspects, but it’s the trickery to get someone to click on […]

When it comes to digital security, millennials are slackers (but so are boomers)

unlocked-gate

Data from a survey of nearly 800 employed U.S. adults makes clear what enterprise IT security professionals have always known: Humans — of all ages! — are the single biggest security vulnerability in any enterprise. Conducted by payment technology solutions vendor First Data, the survey aimed to assess the cybersecurity awareness of different age groups among […]

Not all cyberattacks are over data theft

locked-gate

When executives consider the risk to their systems they often consider only the value of their data and that of their customers. Too rarely do they consider the intrinsic value of their raw computing power or how their computing systems could be used as part of a larger attack. Case in point, last week security […]

Exploring multiple-factor authentication in the consumer market

password authentication DXC Blogs

When Odysseus meets his family again after a decades-long journey, he must undergo many obstacles to prove himself the true ruler of Ithaca and legitimate husband of the queen, Penelope. New suitors and imposters are striving to take possession of the throne and its assets. But Odysseus, the architect of the Trojan horse, is aware of the […]

6 classic hacker movies for your Thanksgiving weekend

cybersecurity movies CSC Blogs

Who doesn’t love a good hacker movie? I know I do! The long Thanksgiving weekend in the U.S. is the perfect time to kick back and enjoy a flick that puts cyber issues front and center. Not sure where to start? Well, here are six classics to put on your play list. Consider these the “must-sees” for anyone who wants […]

As IoT risks rise, security vendors won’t meet challenge, says Gartner

IoT security CSC Blogs

As Albert Verhoeven wrote in his post last year, Two Reasons the IoT Will Be Disruptive Sooner than You Think, “the Internet of Things is developing rapidly on a global scale and has the potential to be as disruptive as the Internet and mobile phones. A true disruption can, and will, be achieved if these […]