Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Every senior manager knows that falling prey to a malware attack could yield catastrophic results. But what if that malware spread beyond your own systems, taking your partners, customers and supply chain down with you? Cybercriminals have been busy over the past year, carrying out an alarming number of malware attacks varying the payload from types that enable access to confidential client or personnel data to a recent wave of ransomware attacks. Yet despite a...

Read more

Harman has developed a sophisticated security system to keep drivers safe on the information superhighway Not long ago the concept of automotive cyber security didn’t even exist. Cars and their occupants were isolated from the outside world – at least in electronic terms. Since the advent of the connected car all that’s changed, though. There’s now a very serious threat that hackers, criminals or even terrorists could attempt to seize control of cars or the...

Read more

It seems that right now, everyone is talking about threat intelligence. Nearly every security vendor wants to get in on the action and the majority of security operations groups are either being told by their management to get on board with it, or they’ve attended various security conferences and realised they need to add threat intelligence into their security program. That said, the questions most security operations groups always come back with, though, are: What...

Read more
online-retail-ecommerce

These days we are becoming increasingly reliant upon the internet, even for our day-to-day tasks. Checking our bank balance, paying a bill, shopping and socialising, are just some of the activities that we now do online. The growth of our digital avatars, and the increasing number of tasks that we can do online, has been facilitated by the ease at which we can pay for services online. Online payment services have allowed many industries to...

Read more

The next two years are set to bring about remarkable change. The UK’s future within European borders, the introduction of the universal flu vaccine as well as the substantial increase of data flow into organisations. These are undoubtedly key milestones which are set to affect not only the UK but also the rest of the world. In 2018 we will see the deadline hit for meeting new regulations around the treatment of personally identifiable information...

Read more

Bitcoin has not only changed the economics of cybercrime by providing crooks with an encrypted, nearly anonymous payment system autonomous from any central bank. It's also changed researchers' ability to track how much money criminals are making. "Bitcoin is based on Blockchain, and Blockchain is a public ledger of transactions. So all Bitcoin transactions are public," explains Mikko Hypponen, F-Secure's Chief Research Officer. "Now, you don’t know who is who. But we can see money moving around, and we...

Read more

Pokémon GO is this summer’s craze, with the latest figures showing that 7.5 million people have downloaded it. And along with Rattata and Pidgey, people have also been discovering a number of personal risks while playing – notably, falling off cliffs or even wandering in front of traffic. But what about business risks?  If an employee uses their personal phone (even if they don’t play Pokémon GO) for work e-mail (e.g. BYOD) are they unknowingly...

Read more

Automation is becoming ubiquitous across most industries. In manufacturing, global sales of industrial robots are expected to almost double in volume by 2018, reaching 400,000 units. In the home, revenue from the home automation segment is expected to hit over $6 million this year and show an annual growth rate of CAGR 28.19%. One of the biggest areas for automation we have seen is in the automotive industry, with the appetite for fully autonomous, self-drive...

Read more

The numerous data breaches that have hit the media headlines over the past few years demonstrate how imperative it is that every organisation creates a detailed action plan in the event that a hacker is able to infiltrate their system and steal a treasure trove of data. What’s more, cyber threats are evolving, fast, as criminal gangs embark upon increasingly targeted attacks, from social engineering to exploring the dark web for company specific information, to...

Read more

“#FIJ wins gold in men's rugby, beating #GBR. Barbara Engleder #GER wins shooting gold in women's 50m rifle 3 positions, beating Zhang Binbin #CHN.”  These are just exemplifications of the tweets covering the Rio Olympics, crafted by Washington Post’s new journalist, who’s been working tirelessly and has been ‘recruited’ into the team without any contract for taking weekends off! Meet Heliograf, the unassuming bot running on AI technology, that’s already made news with its extensive...

Read more
Page 45 of 69 1 44 45 46 69