From phishing to ransomware, one of the primary challenges with effective cybersecurity risk management is related to the weakest link theory. The essence of this theory is the phrase “a chain is no stronger than its weakest link.” This idiom reflects the fact that effective cybersecurity risk management is a complex system of related and inter-dependent parts. If one component fails, it can jeopardize the entire system.
According to the reports, China updated its export control rules to incorporate technology that could include TikTok, a claim later reasserted by commentary published in China’s state-controlled Xinhua news agency on Saturday.
These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.
India needs an army of cybersecurity experts, tools and technology to protect its assets against malicious attackers as data becomes a pervasive “lifeline” for countries, says C. P. Gurnani, CEO and managing director of Tech Mahindra.
RSA Security President Rohit Ghai explains how the cheese has moved for his business from protecting the office to protecting the home.
“Without any solid evidence,” a Chinese government spokesperson complained last week, “some people in the U.S. have been abusing the concept of national security to suppress non-American enterprises. These U.S. moves are utterly disgraceful.” You can use Google to find those comments on the ongoing TikTok pantomime if you like—they’re online.
When thinking about physical security in the cyber realm, the mind, more often than not, turns to the risks posed by so-called smart locks. When I recently asked 549 security professionals if they would use a smart lock, 400 of them said no, get in the sea.
The battle between the Trump administration and Chinese tech company Huawei has escalated materially this week—and while the implications have not yet been fully assessed, this looks like it could be the game-changer.
Malicious Chinese SDK In 1,200 iOS Apps With Billions Of Installs Causing ‘Major Privacy Concerns To Hundreds Of Millions Of Consumers’
A Chinese ad network named Mintegral is accused of spying on user activity and committing ad fraud in more than 1,200 apps with 300 million installs per month since July 2019. Mintegral is headquartered in Beijing, China, and is owned by another Chinese ad network, Mobvista, which has a head office in Guangzhou, China.
A cybersecurity researcher has revealed how one single vulnerability in Chromium-based web browsers left Google Chrome, Microsoft Edge and Opera users exposed and at risk of data theft for a year.
In June, I wrote about how the ransomware threat was evolving and what it really cost victims to recover, regardless of whether they pay the ransom or not. Two months and several high-profile multi-million dollar attacks later, including the likes of Garmin and Carlson Wagonlit, it’s worth wondering why it is that ransomware continues to succeed against what are often well-defended organisations, and is there anything we can do about it?
In mid-July, a series of high-profile Twitter accounts began spamming the same messages asking users to send them bitcoin. Apple, Uber, Joe Biden, Elon Musk— the accounts affected were some of the most well-known brands and names on the planet. The culprit? A 17-year-old from Florida stands accused of being the mastermind behind the scam. The hack exposed big issues with Twitter’s security.
Governments have collected large amounts of data to fight the coronavirus. That’s raising privacy concerns
Technology has enabled the world to respond quickly to the coronavirus pandemic — but solutions through mass data collection have also raised questions about privacy rights. Digital check-in systems, wristband trackers and mobile applications are just some examples of the surveillance technology implemented by governments to monitor and track the movement of people as they seek to stem the spread of the virus.
As governments worldwide harness technology to trace and curb the spread of the coronavirus, there are growing concerns about privacy violations and data protection. CNBC’s Nessa Anwar discusses the trade-offs in a global health crisis.
With racial injustice at the forefront of our newsfeeds, companies are not only looking to revamp how they approach diversity, equality and inclusion, but also how they recruit and hire to begin with. Smart, forward-thinking executives across the world need to recognize the unconscious bias that exists in the hiring process that causes managers to lean toward appointing people whose lives mirror their own. Cybersecurity is no different.
The publication of the Expansion of the Clean Network to Safeguard America’s Assets coming from the Secretary of State’s office yesterday is an example of posturing and saber rattling that will result in zero impact on intellectual property theft, potentially massive wasted expenditure, and more government encroachment on free markets. It will not end well.