Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Cyber Security


Category

Is Your Boardroom The Weakest Cybersecurity Link?

Is Your Boardroom The Weakest Cybersecurity Link?

From phishing to ransomware, one of the primary challenges with effective cybersecurity risk management is related to the weakest link theory. The essence of this theory is the phrase “a chain is no stronger than its weakest link.” This idiom reflects the fact that effective cybersecurity risk management is a complex system of related and inter-dependent parts. If one component fails, it can jeopardize the entire system.

Forbes October 8, 2020
China tightens tech export controls potentially jeopardizing TikTok deal, reports say

China tightens tech export controls potentially jeopardizing TikTok deal, reports say

According to the reports, China updated its export control rules to incorporate technology that could include TikTok, a claim later reasserted by commentary published in China’s state-controlled Xinhua news agency on Saturday.

CNBC October 8, 2020
What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.

Forbes October 8, 2020
India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra

India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra

India needs an army of cybersecurity experts, tools and technology to protect its assets against malicious attackers as data becomes a pervasive “lifeline” for countries, says C. P. Gurnani, CEO and managing director of Tech Mahindra.

Forbes October 8, 2020
Protecting the home network is a new challenge and a new reality, says cybersecurity exec

Protecting the home network is a new challenge and a new reality, says cybersecurity exec

RSA Security President Rohit Ghai explains how the cheese has moved for his business from protecting the office to protecting the home.

CNBC October 8, 2020
Why Google And YouTube Are Now China’s Most Wanted

Why Google And YouTube Are Now China’s Most Wanted

“Without any solid evidence,” a Chinese government spokesperson complained last week, “some people in the U.S. have been abusing the concept of national security to suppress non-American enterprises. These U.S. moves are utterly disgraceful.” You can use Google to find those comments on the ongoing TikTok pantomime if you like—they’re online.

Forbes October 8, 2020
How Hackers Use Sound To Unlock The Secrets Of Your Front Door Key

How Hackers Use Sound To Unlock The Secrets Of Your Front Door Key

When thinking about physical security in the cyber realm, the mind, more often than not, turns to the risks posed by so-called smart locks. When I recently asked 549 security professionals if they would use a smart lock, 400 of them said no, get in the sea.

Forbes October 8, 2020
Has Trump Suddenly Ended Huawei’s Smartphone Business?

Has Trump Suddenly Ended Huawei’s Smartphone Business?

The battle between the Trump administration and Chinese tech company Huawei has escalated materially this week—and while the implications have not yet been fully assessed, this looks like it could be the game-changer.

Forbes October 8, 2020
Malicious Chinese SDK In 1,200 iOS Apps With Billions Of Installs Causing ‘Major Privacy Concerns To Hundreds Of Millions Of Consumers’

Malicious Chinese SDK In 1,200 iOS Apps With Billions Of Installs Causing ‘Major Privacy Concerns To Hundreds Of Millions Of Consumers’

A Chinese ad network named Mintegral is accused of spying on user activity and committing ad fraud in more than 1,200 apps with 300 million installs per month since July 2019. Mintegral is headquartered in Beijing, China, and is owned by another Chinese ad network, Mobvista, which has a head office in Guangzhou, China.

Forbes October 8, 2020
How This Chrome, Edge And Opera Security Bug Left Users At Risk—For A Whole Year

How This Chrome, Edge And Opera Security Bug Left Users At Risk—For A Whole Year

A cybersecurity researcher has revealed how one single vulnerability in Chromium-based web browsers left Google Chrome, Microsoft Edge and Opera users exposed and at risk of data theft for a year.

Forbes October 8, 2020
Victims Of Cyberattacks Have Much To Teach Us About The Early Warning Signs Of Intruders

Victims Of Cyberattacks Have Much To Teach Us About The Early Warning Signs Of Intruders

In June, I wrote about how the ransomware threat was evolving and what it really cost victims to recover, regardless of whether they pay the ransom or not. Two months and several high-profile multi-million dollar attacks later, including the likes of Garmin and Carlson Wagonlit, it’s worth wondering why it is that ransomware continues to succeed against what are often well-defended organisations, and is there anything we can do about it?

Forbes October 8, 2020
What Twitter’s big hack means for the 2020 elections

What Twitter’s big hack means for the 2020 elections

In mid-July, a series of high-profile Twitter accounts began spamming the same messages asking users to send them bitcoin. Apple, Uber, Joe Biden, Elon Musk— the accounts affected were some of the most well-known brands and names on the planet. The culprit? A 17-year-old from Florida stands accused of being the mastermind behind the scam. The hack exposed big issues with Twitter’s security.

CNBC October 8, 2020
Governments have collected large amounts of data to fight the coronavirus. That’s raising privacy concerns

Governments have collected large amounts of data to fight the coronavirus. That’s raising privacy concerns

Technology has enabled the world to respond quickly to the coronavirus pandemic — but solutions through mass data collection have also raised questions about privacy rights. Digital check-in systems, wristband trackers and mobile applications are just some examples of the surveillance technology implemented by governments to monitor and track the movement of people as they seek to stem the spread of the virus.

CNBC October 8, 2020
The changing face of privacy in a pandemic

The changing face of privacy in a pandemic

As governments worldwide harness technology to trace and curb the spread of the coronavirus, there are growing concerns about privacy violations and data protection. CNBC’s Nessa Anwar discusses the trade-offs in a global health crisis.

CNBC October 8, 2020
To Help Tackle Workforce Shortage, Cybersecurity Needs To Address Unconscious Bias In Hiring

To Help Tackle Workforce Shortage, Cybersecurity Needs To Address Unconscious Bias In Hiring

With racial injustice at the forefront of our newsfeeds, companies are not only looking to revamp how they approach diversity, equality and inclusion, but also how they recruit and hire to begin with. Smart, forward-thinking executives across the world need to recognize the unconscious bias that exists in the hiring process that causes managers to lean toward appointing people whose lives mirror their own. Cybersecurity is no different.

Forbes October 8, 2020
There Will Be Blowback

There Will Be Blowback

The publication of the Expansion of the Clean Network to Safeguard America’s Assets coming from the Secretary of State’s office yesterday is an example of posturing and saber rattling that will result in zero impact on intellectual property theft, potentially massive wasted expenditure, and more government encroachment on free markets. It will not end well.

Forbes October 8, 2020

By continuing to use the site, you agree to the use of cookies. We use cookies and may also make use of your personal data in order to enhance your experience. By using this site you agree to our Privacy Policy. Please take the necessary time to read and understand its contents. Read More

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close