Leoni AG, a Germany-based supplier of wires, cables and wiring systems, has fallen victim to fraud with the help of falsified documents and identities and the use of electronic communication channels, the company has announced. As a result, company funds were transferred to accounts abroad.
All about Virtualization and Cloud Security | Recent Articles:
Information technology companies are especially aware of the need for strong cyber security, given that their products and services are an integral part of why security measures are needed in the first place.
Although insider leaks and attacks continue to multiply, recent research found 58 percent of IT operations and security managers believe their organizations unnecessarily grant access to individuals beyond their roles, with 91 percent predicting the risk of insider threats will grow or stay the same.
Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs have started migrating corporate information from traditional data centers to a cloud infrastructure, boosting server workloads, according to a recent research.
Passwords are a perennial problem.
We rely so much on them to secure our company systems, our secrets, our customers’ private information… and yet we typically leave it in the hands of our users to choose their passwords safely.
With cloud adoption becoming a reality for companies, most admit having experienced cloud security incidents - 59% reported incidents related to unwanted external sharing and 47% reported incidents involving access from unauthorized devices, a survey shows.
The internet is a far stranger place than the average user gets to experience. It’s used not only for everyday activities such as looking up recipes and updating Facebook statuses, but also for activities that might land users in jail.
Two recent hacker attacks show that the cyber assault against organizations in the healthcare sector continues.
With the rise of APTs and the continued interconnection of critical infrastructure business-technology systems and field systems and devices the attention toward critical infrastructure security has never been higher. And nations around the world are building both offensive and (more slowly) defensive capabilities when it comes to cyber-attacks targeting critical infrastructure.
Some enterprise technology deployments can be handled entirely by IT, don’t require executive support or the cooperation of the entire organization. Identity management implementations are not one of these types of initiatives. They take dedicated and adequate budget, executive leadership, and long-term enterprise-wide dedication. So how do enterprises get the C-suite buy-in they need?
As the cloud’s popularity grows, so does the risk to sensitive data. More than half of companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations.
There are few things that everyone in the information security industry agrees upon, but the need to share threat and risk mitigation information is certainly one area where there is majority agreement. Everyone concurs that it’s essential for security professionals to share security related intelligence about their industries, about what defenses and controls work, and what controls don’t, and information about the daily changing nature of the threats out there.
Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to Gartner’s recent forecast.
The hacks and vulnerabilities out of Black Hat USA are interesting every year. Last year much of the focus was on flaws within cars, mobile devices, and IoT. There was a lot of focus on those areas this year, too. And I expect much of the attention paid to vulnerabilities to continue to be on the extended Internet and IoT for years to come.
Some time ago we examined the key cyber security issues and challenges facing a number of industries. Things change fast in the security arena, so we thought it would make sense to provide an updated look at some of these sectors.