Technology has advanced at an astonishing rate in the last decade, and the pace is only set to accelerate. Capabilities that seemed impossible only a short time ago will develop extremely quickly, aiding those who see them coming and hindering those who don’t. Developments in smart technology will create new possibilities for organizations of all kinds – but they will also create opportunities for attackers and adversaries by reducing the effectiveness of existing controls. Previously well-protected information will become vulnerable.
Security breaches have become common place. Daily, we hear cybersecurity breach reports in the media. However, when healthcare institutions are impacted, consumers see this as “more detrimental” than other industry breaches.
As OT and IT converge, organizations can use IoT devices to boost the efficiency of industrial processes, but these devices and processes also present new risks and points of vulnerabilities.
Cyber attacks are the now the biggest threat to business in the eyes of investors, mirroring growing global concern from business leaders, according to a new study by PwC.
Malware researchers at Ben-Gurion University of the Negev (BGU) are warning medical imaging device (MID) manufacturers and healthcare providers to become more diligent in protecting medical imaging equipment from cyber threats.
In a newly released report, the Department of Homeland Security (DHS) Office of Inspector General (OIG) found that while DHS has established a process for sharing cyber threat information between the Federal government and the private sector, improvements are still needed.
To address the IT security talent shortage, Kaspersky Lab has teamed up with partners such as Dassault Systems, PWC and Schlumberger to create a talent discovery program, the Cybersecurity for the Next Generation.
Many of those with demanding jobs know that even when on vacation they must remain connected to the world in more ways than one to answer emails and handle important business matters. With the increased use, online services by these traveling professionals, especially in unknown territory, those traveling can quickly become a target of cyber criminals and hackers.