As worldwide cyber threats keep growing, cyber criminals are constantly adapting their methods to attack organizations and evade detection. Standing on our own against such malicious attackers, most organizations don’t have a chance without effective threat communication between the public and private sectors.
The owner of restaurant chain Shoney’s, Best American Hospitality Corp. (BAHC), confirmed a data breach of customer data at dozens of Shoney’s restaurants. The company…
In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.
In case you missed it, the Federal Trade Commission (FTC) released a video that explains how companies can leverage NIST’s Cybersecurity Framework and FTC’s own “Start with Security” guidelines to greatly improve security in their organization. In this article, we highlight the five key tenants from the framework and how they could have possibly prevented FTC action and penalties.
The Verizon security team recently announced the first Data Breach Digest, a series of 18 cybercrime cases the team investigated. The Verizon team starts with a sneak peek of one of the case studies that describes how a university was attacked by an IoT botnet consisting of over 5,000 infected hosts. The study concludes with 12 good lessons learned from the attack.
A new malware campaign was responsible for sending 23 million emails containing Locky ransomware in just 24 hours earlier this week.
To help IoT developers secure their products and fight future DDoS attacks, the Cloud Security Alliance (CSA) IoT Working Group issued a report titled “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products.”
In this article, we highlight some key points from the CSA report, to include guidelines on how to better secure communications, applications and APIs to enhance security of IoT products.
In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT report, to include hardware-based controls to enhance security of IoT products. The CSA IoT Working Group report, is titled “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products.”
In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT Working Group report, “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products,” to include guidance on how to establish a framework, platform and privacy protections to enhance security of IoT products.