Flaws in Subaru's telematics software, discovered by a security researcher, could have been exploited to unlock the doors or provide remote access to a car's location history. The problems - now fixed by Subaru - underscore carmakers' ongoing cybersecurity challenges.
On the eve of Europe's biggest annual cybersecurity conference, and scores of interviews with some of the world's leading information security experts, I'm asking how the London Bridge attacks will change the tenor of at least some of these discussions.
ISMG's Fraud & Breach Prevention Summit in Bengaluru will provide expert insights on best practices for addressing emerging cyberthreats and tackle timely topics, including Aadhaar authentication, ransomware and the latest breach trends.
The annual Infosecurity Europe conference returns to London this week, offering discussions of the latest information security practices, procedures and technologies as well as deep-dives into privacy, cybercrime, policing, surveillance, GDPR and more.
The latest ISMG Security Report focuses on evolving Russian cyber threats, including manipulating hacked documents as part of a disinformation, cyber-espionage campaign.
Cybersecurity professionals believe that technology integration, collaboration between cybersecurity and IT
operations, and tight alignment between cybersecurity and IT operations frameworks are important components
for incident response performance. However, incident response has become more difficult over the past...
Kmart has suffered a data breach affecting "some, not all" of its 735 U.S. locations as a result of its point-of-sale systems being infected by malware designed to siphon payment card data. The retailer described the malware as "undetectable by current anti-virus systems and application controls."
Despite being one of the most heavily regulated industries, Healthcare companies still struggle to assess their risk at more than a surface level. A good assessment has to include people, policies, procedures, controls and technologies. The task is daunting but increasingly critical.
Download this case study...
Security professionals think in terms of risks and threats to ensure that the right security measures are deployed in the right places and to a proper degree. Security teams need an evaluation process to help them determine whether an object is under-protected or over-protected, but traditional security assessment...
Many organizations are undergoing a transformation to support digital platforms and stay competitive; but in order to maintain security, they have to ensure that access to these platforms is limited and that security remains a priority. New vulnerabilities to cybercrime are being introduced through hybrid...
In 2014, the FFIEC released the Joint Statement "Distributed Denial-of-Service (DDoS) Cyber-Attacks, Risk Mitigation, and Additional Resources." This session will review the six primary guidelines provided within the statement, assess the evolution(s) that have occurred in the threat landscape since its release and...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Samy Kamkar became everyone's virtual friend in October 2005. His MySpace worm is still the most potent one ever unleashed on a social network, but it was just the start of a prolific hacking career.
As the adversaries develop new methods to strike at increasingly vulnerable digital infrastructures, it is time businesses take a hard look at the way defense is approached and recast security models to drive the cost to the attacker up, says Palo Alto Network's Sean Duca.
Privileged Access Management (PAM) is the hottest new solutions strategy, but it is also one that is at a critical crossroads of development and acceptance. What can you do today as a senior security leader to ensure that the most mature PAM solutions become effective, integral components of your organization's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.