The Real Risk Of Reputational Damage

There is no ‘one-size-fits-all’ when it comes to compliance. Each regulation has a different focus, with different rules aligned to its individual purpose, sometimes with conflicting requirements. For example, financial institutions must comply with anti-money laundering (AML) and fraud regulations involving strict controls on transaction reporting. Yet AML compliance must be in line with GDPR […]

FBI Warns Of Global ATM Cybercrime Spree

NCR alert on uptick in ATM skimming

Following a warning by the FBI that cyber-criminals are planning a highly choreographed global attack on cash machines to fraudulently withdraw millions of dollars from customer bank accounts, IT security experts commented below. Sam Curry, Chief Security Officer at Cybereason: “The FBI’s global warning about the potential ‘ATM cashout’ is only effective if: (1) The defenders […]

New Research Revealing Browser Cryptomining Generating $250K Every Month

New research from RWTH Aachen University in Germany has found that Coinhive browser cryptomining is generating about $250-Thousand dollars a month with most of it going to just 10 individuals. Chris Olson, CEO at The Media Trust: “The rising popularity of cryptomining is the reason why cryptojacking has overtaken ransomware as hackers’ malware of choice. […]

Intel Foreshadow Flaw

Data-Centric Security Protection Enhancements

A new Intel security flaw has been exposed – named ‘Foreshadow,’ the flaw is similar to Meltdown and Spectre, in that it undermines the most secure element of the company’s chips. Intel admits that theForeshadow bugs can be used to launch ‘speculative execution’ attacks – exploiting how Intel chooses to run parts of computer programs before […]

FireMon’s Annual State Of The Firewall Report Finds Chronic Deficiencies In Basic Firewall Hygiene

firewall

Chaos and confusion reign with existing firewall Infrastructure; hybrid cloud and next-gen architectures promise to add even more complexity and risk  FireMon, a global leader in network security policy management, today released its 2018 State of the Firewall report. The fourth annual study polled 334 C-suite executives, IT practitioners and security professionals at global companies of all […]

July’s Most Wanted Malware: Attacks Targeting IoT And Networking Vulnerabilities On The Rise

Cyber attacks targeting IoT and network router vulnerabilities doubled since May 2018, says Check Point’s latest Global Threat Index   Check Point㈢ Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, has published its latest Global Threat Index for July 2018, revealing a significant increase in exploits targeting three major IoT vulnerabilities. These attacks, which are linked […]

Critical Bug Opens Millions Of HP OfficeJet Printers To Attack

A new research by Checkpoint, OfficeJet all-in-one inkjet printer can give hackers control of the printer and act as a springboard into an attached network environment. IT security experts commented below. Jason Garbis, VP at Cyxtera: “This vulnerability is an excellent example of the porousness of the perimeter, and the need to enforce the principle […]

The Future Role Of Artificial Intelligence In Enterprise IT Security

With more than four in ten UK businesses reporting a security breach or attack in the last year, what role could Artificial Intelligence (AI) play in the future of enterprise IT security? Ankur Laroia, Leader Solutions Strategy, Alfresco, discusses the potential deployments and benefits. How ready is the enterprise to trust AI with its data […]

GDPR Publishers Adopting CMPs Fear Losing Ad Revenue

expert comments on GDPR

A recent report by Adzerk revealed that more publishers are feeling under pressure to adopt a consent-management platform to be compliant with the General Data Protection Regulation. Matt O’Neill, General Manager for EMEA at The Media Trust:  “GDPR has disrupted digital advertising from the perspectives of risk, laws, and technology. Not using a CMP is simply not […]