Over a four-day period in June 20 years ago, hackers simulated an attack on the power grids and 911 emergency systems in eight U.S. cities and then infiltrated and took control of U.S. Pacific Command computers.
After Stephen Paddock killed 58 people and wounded 489 in Las Vegas, the question will be asked: What can be done to mitigate the possibility of another Las Vegas incident?
To select the most comprehensive yet affordable cyber insurance plan for your business, it’s critical to first identify who is accessing your confidential data and how they’re accessing it, as this information will largely dictate how your cyber insurance policy is outlined. Ensure your effective policy includes these six key components.
Ignoring cybersecurity whistleblowers or, even worse, subjecting them to retaliation will not fix data security problems. Instead, it will only result in increasing an organization's legal exposure and driving cybersecurity whistleblowers to report externally.
The Daytona International Speedway recently underwent a complete transformation, evolving from a grandstand to the world’s only motorsports stadium. The $400 million renovation, which began in 2013 and was completed in 2016, changed everything about the iconic speedway, from the fan experience to the operational logistics to the facility’s security needs.
In 2015, it seemed no one was safe from hackers. The year began with Sony reeling from a hack that put the studio and celebrities such as Seth Rogen and James Franco in a web of geopolitics and extortion. Seven months later came the high-profile Ashley Madison hack, which resulted in the release of the email and physical addresses for 37 million users. Cybercriminals stole $1 billion from banks in 30 countries as part of the Carbanak hack. Even the Director of the CIA wasn’t safe – his AOL email account was hacked by someone claiming to be a high school student.
Being adequately prepared to respond to a data breach is an ever-changing game – new threats are emerging, new regulations are being put into place and companies must regularly re-evaluate their response plans to ensure they are applicable to today’s threat landscape. Unfortunately, many companies are not reviewing and updating their plans frequently enough – in fact, only 25 percent of companies say they update their response plans once or twice a year. Not to mention that no matter how well prepared and updated a company’s plan is, an actual live breach response can present unforeseen challenges that cause companies to stumble.
While the U.S. continues to dominate – with more than 80 percent share of the global market in 2015 – a recent report by Zion Market Research forecasts Asia Pacific and Latin American regions to experience considerable future growth in demand for cybersecurity solutions.
Enhancing the ability of law enforcement to investigate cyber-enabled human trafficking was the focus of a regional table-top exercise organized by the Rwanda National Police (RNP) and INTERPOL.
In contrast to the United Kingdom’s decision to exit the European Union this summer, The African Union (AU) has moved further toward the free cross-border movement of goods and people with the launch of the new pan-African passport.