Wednesday , 15 August 2018
Home » NEWS » THIS WEEK’S GURUS

THIS WEEK’S GURUS

Keeping the Lights on – Protecting the Energy Sector from Cyberattacks

Tom Kellermann,
Carbon Black

By Tom Kellermann, Chief Cybersecurity Officer, Carbon Black When the Die Hard movie franchise got a reboot in 2007 the plot revolved around an attack on New York’s infrastructure, with our hero John McClane up against a gang of cybercriminals intent on gaining access to critical energy, water and transport control systems to wreak chaos and (naturally) make off with ... Read More »

Making the Cloud a Safe Space

Ronald Sens, EMEA Director,
A10 Networks

The cloud has brought about many benefits for organisations and adoption is understandably increasing. Gartner earlier this year projected that the worldwide public cloud services market would grow 21.4 percent in 2018 whilst Forrester has found that global cloud services revenues totaled £112.5 billion in 2017, and is predicted to grow up to £137.2 billion by the end of 2018. ... Read More »

The Need for Effective Third-Party Risk Management in Financial Services

Tom Turner, CEO,
BitSight

In the last few years we have seen the frequency and severity of third-party cyberattacks against global financial institutions continue to increase. One of the biggest reported attacks against financial organisations occurred in early 2016, when $81 million was taken from accounts at Bangladesh Bank. Unknown hackers used SWIFT credentials of Bangladesh Central Bank employees to send more than three ... Read More »

Protecting Data in the Era of IoT

Christoph Ruef, General Manager, Americas Printing Business,
HP Inc.

The use and adoption of IoT devices is continuing to grow at break-neck speed. In fact, IHS Markit recently predicted that the number of IoT devices will balloon to 125 billion by 2030. Clearly, the advantages of IoT devices are well-understood: they are more capable, more efficient, and more reliable than their predecessors. But as IoT devices flood the office ... Read More »

Iron Rain: What Defines a Cyber Insurgency?

Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist,
Carbon Black

“A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and standard bodies are collapsing. History ... Read More »

Cybercriminals Targeting Popular Job Recruitment Portals About More Than PII

David Shear & Mike Mimoso,
Flashpoint

Job listing and recruitment portals have been an attraction for cybercriminals given the volume of personal information uploaded to those sites in the form of resumes, cover letters and other data specific to individuals.   But there’s more to criminals’ interest than just stealing personally identifiable information. Security shortcomings on some of these sites can expose job applicants, business account ... Read More »

Combatting daily security threats within the healthcare sector

Anthony Perridge,
ThreatQuotient

By Anthony Perridge, VP International, ThreatQuotient Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on 12th May, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents. According to the NAO’s published report earlier ... Read More »

Understanding The Cyber Threat Landscape

Suid Adeyanju, Managing Director,
RiverSafe

In early July IBM Security and the Ponemon Institute released a new report titled “Cost of a Data Breach Study” In this study it was reported that  that the global average cost of a data breach and the average cost for lost or stolen information both increased. The former is up 6.4 percent to £2.94 million while the latter increased ... Read More »

Five common myths of SMBs when it comes to cyber security and online encryption

Paul Rosenthal, founder and CEO,
Appstractor

Paul Rosenthal, founder and CEO of online encryption specialist, Appstractor Corporation, takes a look at the five most common myths and misconceptions held by SMB owners when it comes to online security and encryption, and why these thoughts are putting them at risk.   High profile cases in the media have made many business owners and executives aware of the ... Read More »

Cybersecurity Is an Ever-Changing Battlefield

Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist,
Carbon Black

Just like in combat operations, cyber operations are changing on a second-to-second basis. To effectively combat an insurgency, organisations must drive to an intelligence-driven operations centre. In this ever-changing battlefield, internal and external threat intel are now crucially important to combating attackers. Even as a steady drumbeat of headlines keeps the world’s attention focused on cybercrimes, such as ransomware and ... Read More »