Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, 62 percent of IT decision makers report that on-premises security is safer than the cloud, and a new report says 68 percent of businesses are not confident they can protect against an advanced cyberattack.
Read on to learn more.
When discussions around the ways cybercriminals and hackers are able to compromise and penetrate an organization, it regularly leads to the use of exploits and exploit kits.
On May 25, the biggest shake-up to Europe’s data protection laws in almost a generation will finally take effect, after years of planning. For any US organization handling data on EU citizens, including service providers, it means you could face hefty fines. That should get the attention of any board. Yet awareness remains patchy.
A key goal of many chief information security officers is to bolster the protections the company uses to safeguard its most critical assets. This type of priority isn’t difficult to understand in the current cybersecurity landscape – 360,000 new malicious files were discovered every day in 2017, and many of these threats have continued into 2018.
The GDPR enforces the idea that every company should be aware of data privacy for EU citizens, and how we manage their privacy and data within our company.
Before considering autonomous vehicles, we must understand “black box” unsecure mandatory specifications.
One of the biggest impacts that GDPR will have for consumers (citizens of countries that comply with GDPR, at least) is the right to be forgotten. A person can request that they be removed from a record. What if the record is part of a blockchain?
The Trend Micro Cyber Safety Solutions team has been tracking a potentially unwanted app (PUA) distribution campaign that installs PUA software downloaders. During our research, we found that some of these distributors started pushing malware along with PUAs in late 2017.
Legitimate and large-scale cryptocurrency mining operations often invest in dedicated hardware and electric consumption to make a profit. This doesn’t escape the attention of cybercriminals: Malicious cryptocurrency mining was so pervasive last year that it was the most detected network event in devices connected to home routers.
While some organizations have spent decades fine-tuning their ability to respond to and manage cyber risks, far too many are still playing games with their security strategy.
GandCrab infected over 50,000 victims and reaped more than $600,000 for attackers.
Trend Micro looked into the state of email threats and security in 2017 to provide a clearer picture of what organizations are up against — and what can protect them.
Three-quarters of IT professionals share cloud security duties with their cloud providers.
Dudu Mimran, CTO at Telekom Innovation Laboratories, discussed the relationship between AI and cybersecurity in a speech and blog post for the OECD Forum 2018.
33% of organizations report experiencing a security breach and 68% are not confident that they can protect against an advanced attack.
Do you think in-house security is safer than the cloud? Let me know your thoughts below, or follow me on Twitter: @JonLClay.