Cybersecurity and threat news for Europe, the Middle East & Africa
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Hands-on review: The Ekster Wallet protects your cards against RFID attacks
For some time now, I’ve been protecting my credit cards with tinfoil. The tinfoil hat does attract a lot of comments, but thanks to Ekster, those days are now happily behind me.
Report on SingHealth breach condemns poor security practices
The 2018 Singapore SingHealth data breach was poorly managed and riddled with vulnerabilities from the start.
Tesla wants people to hack its Model 3
Tesla is offering white hat hackers what could be the chance of a lifetime – the opportunity to hack one of its Model 3 vehicles.
How to tackle cyber threats in your home
How should you start securing your devices? The company has provided tips for actions you can take across social media, home routers, TVs, and many more.
Endace joins IBM Security app exchange community
EndaceProbe Network Analytics Platform captures, indexes, and stores network traffic while hosting a variety of network security and performance monitoring applications.
Datto names new CEO as founder steps back
Austin McChord continues as a board member as the former president and COO takes over as CEO.
Internet issues, phishing emails top SMEs' tech concerns
A survey of UK small businesses has found that many are concerned about how internet-related issues could affect their business in 2019.
Cisco Talos releases PyLocky ransomware decryptor - but there's a catch
The free decryption tool for Windows users won’t work for everyone.
Facebook ban serves as stern warning for marketing firms
Facebook has banned a digital marketing group in the Philippines from its platform after the agency allegedly violated spam and misrepresentation policies.
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Phishing emails only going to get smarter, warns security firm
Phishing emails typically mimic the look and feel of an email written by someone in authority, such as a bank, or even a colleague.
Huawei CEO goes public on CFO arrest & China security concerns
Ken Hu faced a press conference where he addressed all the elephants in the room and growing concerns around the company's future.
A10’s app delivery solution now on Azure Marketplace
With the Harmony Controller, organisations can automate deployment and operations of application services.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Whitepaper: How physical access control got where it is today
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Whitepaper: The risks of mobility and how security teams can counter them
Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
A photo still enough to defeat face unlock of many phones
Despite almost all smartphone manufacturers bragging about just how secure their ‘face unlock’ feature is, a new study has found many models wanting in security.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Update: Huawei fires employee accused of espionage
The Huawei arrest saga continues as another Huawei employee faces up to 10 years in jail after a recent arrest in Poland.
Bridging the gap to AI security
AI cyber-attacks are not constrained by resources and compromises and can go on indefinitely without the need for pause.
AVANT bring Alert Logic Sec-aaS solution to the channel
AVANT becomes the first master agent to represent Alert Logic to the agent channel community.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
2019’s top three cybersecurity trends - Akamai
Cybercriminals have been moving towards a ‘gig economy’ – an underground community of malicious actors exchanging services.
Why there will be a battle for the cloud in 2019
Cloud providers such as AWS, Azure, and Google will likely find themselves in a mad scramble to gain additional enterprise customers.
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
Encryption app to help travellers secure their devices
"One of the things we wanted to ensure is that when you say you cannot get your data, it is true."
Cloud, DevOps, governance - Modis lists 2019 predictions
Experimentation with new technologies will boom in 2019, as cloud services make advanced tools more accessible.
Cylance launches virtual CISO
Cylance has launched a virtual CISO service to give a helping hand to enterprises that need stronger security resources but may lack a real-life CISO.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Virtustream launches cloud automation and security capabilities
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud.
A10 Networks’ four cloud security predictions for 2019
While many companies had previously been afraid of making the move, new advances in cloud security have reduced the number of successful cyber attacks.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Cyber Readiness Institute launches global training program
“For small and medium-sized businesses, an incident or breach can have devastating consequences," says Microsoft's Tom Burt.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
NordVPN rounds up the worst data breaches of 2018
In 2018, over a billion people’s data was compromised.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Insights: What will happen with data privacy in 2019?
It is certainly the season for predictions and so without further ado, here are some insights from Ensighten CEO Ian Woolley
IT security: How to make your case for security spending
Business will always hesitate to spend money on what will be perceived as non-revenue generating activities
NASA got hacked (again)
The compromised servers stored personally identifiable information (PII) belonging to current and former NASA employees.
How protecting critical infrastructure starts with securing social media
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
Bin 'em: Those bomb threat emails are complete hoaxes
A worldwide spate of spam emails claiming there is a bomb in the recipient’s building is almost certainly a hoax.
Marriott sets up call centres to answer questions on data breach
Marriott has released an update on the breach of the Starwood guest reservation data breach which affected 500 million guests.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Enterprise mobile security: How to get the balance right
Today, neither restricting productivity nor accepting tremendous mobile security risk is a viable option. Mobile threats are prevalent and dangerous.
How ‘thinking small’ can alleviate big security headaches
Microsegmentation is the new ‘east-west’ frontier that looks at all of the network connections an intruder can use to move laterally through your environment.
How to deliver real-time communication without network failures
Until now, delivering any VoIP or UC solution meant investing in purpose-built appliances and proprietary software licenses for each location.
Akamai acquires Janrain for access management capabilities
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
Blue Prism achieves highest level of Veracode accreditation
The RPA software provider states that it the company’s commitment to providing secure solutions.
Remember ransomware? The threat is still very real
“In a nutshell, cybercriminals are less focused on volume and more focused on value."
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
USB regulatory body launches USB-C authentication programme
USB Type-C Authentication empowers host systems to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection.
LogRhythm announces eight cybersecurity predictions for 2019
LogRhythm’s predictions paint a sombre picture for the state of cybersecurity in 2019.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
Digital trust: The bedrock of all business transformations
Every time an organisation interacts with a partner, customer, or supplier, it is building (and hopefully not breaking) digital trust.