All Security Breaches and Attacks articles – Page 17
-
Feature
Security Concerns over Contact Tracing Apps
When an individual is found to be infected with the coronavirus, the race is on to find those who they have come into contact with, as these people could be carriers or even be infected. This has led to hundreds of coronavirus contact-tracing mobile applications being developed worldwide and backed by various governments and national health authorities, as well as guidelines by the EU and special protocols developed by the two major smartphone OS vendors Apple & Google. In some places, the usage of such applications has been made mandatory for people who want to gain access into public spaces.
-
Feature
Preparing for the ‘new normal’ in cyber security
The global coronavirus pandemic has added an enormous strain on employees’ ability to work remotely.
-
Feature
Artificial Intelligence: addressing the risks to data privacy and beyond
As more companies are implementing Artificial Intelligence (AI) as a core part of their digital transformation, there is a requirement for boards to focus on the risks related to AI use of personal data and the potential bias and unpredictability in its output.
-
Video
Stopping Email Data Breaches
People cause data breaches every day. Often, without meaning to and the vast majority while using corporate email accounts.
-
Video
Will COVID-19 have a long lasting and transformative impact on the cybersecurity industry?
A new norm, a new reality, a new way of living has been exacted on most of the globe due to the ongoing pandemic. It has changed the way people live, and in turn the way businesses must operate and navigate these challenging times.
-
Video
Recovering from a Breach: Back up, Recovery, Learnings and Best Practice
Unfortunately, data breaches are on the rise. Not only do they pose a threat to the reputation and finance of organisations large and small, but data loss can wipe out hours of productivity, costing the business even further.
-
Video
Ivana Bartoletti in conversation with Joe Tidy
Ivana Bartoletti, Technical Director at Deloitte, and author of ‘An Artificial Revolution: On Power, Politics and AI’ will sit down BBC News, Cyber Security Correspondent, Joe Tidy for a virtual fireside chat to discuss Ivana’s book, and the current challenges and future of Artificial Intelligence.
-
ebook
Improving Cybersecurity for Remote Working: 13 Recommendations
What are the security implications of this abrupt change? And which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?
-
ebook
Remote Work Security: Privacy and Cybersecurity Essentials
With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.
-
-
-
Feature
Addressing Privacy and Data Security Implications of the Coronavirus
COVID-19 arrives just as the first omnibus privacy statute in the United States, the CCPA became effective. Since its January 1 effective date, we continue to wait for finalization of the CCPA regulations and enforcement that was slated for July 1.
-
News
Hundreds of thousands of credit card details leaked online
Credit card details issued by banks from at least six Southeast Asian countries have been leaked online.
-
News
Lead generation company exposes over 110m records
Lead generation company, Leadhunter, has exposed and lost over 110 million records due to an unsecured database.
-
Article
Ireland ranked least vulnerable European country to cybercrime
Research reveals that the Netherlands is the most vulnerable European country to cybercrime.
-
-
Podcast
Nigel Tozer: Back-up and Recovery in the Cloud
Listen to hear from Nigel Tozer, a privacy expert at Commvault as he discusses Back-up and Recovery in the Cloud.
-
Article
Ikea apologises for data breach
The homeware retailer, Ikea, has issued an apology to Singapore-based customers that may have been adversely impacted by a data breach the firm suffered.
-
Feature
Can artificial intelligence beat a human hacker?
At some point, we have all completed a captcha to prove we are human when online. So, when a robot successfully completed the test, we were left asking, are our computers secure?
-
News
Research reveals the most vulnerable IoT devices
SAM Seamless Network unveils its Threat Assessment Lab research, investigating new attack vectors focusing on IoTs.