Two U.S. senators filed a bill that would require the federal government to establish standards to ensure automakers secure a driver against vehicle cyber attacks.
IT security is complicated enough. The widespread adoption of BYOD mobile devices and the overall consumerization of IT promise to complicate security efforts exponentially. Are companies up to the challenge?
Germany has passed legislation ordering that more than 2,000 essential service providers implement new minimum information security standards or face penalties.
The theme for RSA 2015 was the title of this article and sound advice in an era fast evolving into a global IoT (Internet of Things) environment. Two (of many) trends discussed at the show highlighted that digital crime has accelerated globally, and the attack surface (read criminal opportunity) of the IoT vastly compounds this growth rate.
Nearly half of all credit card fraud around the world occurs in the U.S., although Americans account for just a quarter of global card volume, according to a recent Barclays report, which claims that the reason for the disproportionate fraud is that the U.S. still relies on outdated magnetic stripes, which are easy for hackers to replicate or manipulate.
Mention cybersecurity and immediate thoughts turn to technical controls such as firewalls, endpoint detection and patching systems. While these and other technical controls certainly are necessary, they must work in tandem with administrative and physical controls in order to form a mature risk mitigation program. This month, we will explore some of the physical aspects of cyber risk management, which inherently relies upon on-site security personnel and employee training for proper execution.