Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for social media companies.
Trend Micro’s survey of global IT and security decision-makers found that companies are exposing themselves to greater risks by excluding IT security teams from discussions on IoT deployment plans.
Business Email Compromise, or BEC, is creating opportunities for cybercriminals to make money off of their malicious activity, and the sophistication of these attacks make them difficult to guard against.
Homeland Security Secretary Kirstjen Nielsen stated that cyberweapons pose a greater threat to the U.S. than the risk of physical attacks.
IT\OT processes may converge as they evolve. DevOps breaks down the barriers between development and operations for rapid deployment of new functions without compromising software quality.
After admitting that it tracks users’ location even after they disable location history, Google revealed that it has signed a secret deal with Mastercard that allows it to track what users buy offline.
Most senior executives recognize that IoT can introduce security risk to the organization, but few will invest resources to remediate that risk.
The Equifax data breach that affected more than 145.5 million U.S. adults was supposed to change everything about cybersecurity regulation on Capitol Hill. One year later, it hasn’t changed anything.
Cybercriminals compromise email accounts to enter the IT premises of an organization and carry out attacks ranging from fraud and spying to information and identity theft.
Senate and House representatives applauded efforts by Facebook and Twitter to root out foreign election meddling, but warned that regulation may loom for social media companies.
Do you think companies need to include security teams in discussions about IoT deployment plans? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.