Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Cyber Security


Category

For Cybersecurity Awareness Month (and Halloween) – Some Scary Cyber Threat Stats

For Cybersecurity Awareness Month (and Halloween) – Some Scary Cyber Threat Stats

Around 40% of ethical hackers recently surveyed by the SANS Institute said they can break into most environments they test, if not all. Nearly 60% said they need five hours or less to break into a corporate environment once they identify a weakness.

Forbes October 3, 2022
Cybersecurity Outsourcing: Principles of Choice and Trust

Cybersecurity Outsourcing: Principles of Choice and Trust

A few years ago, cybersecurity outsourcing was perceived as something inorganic and often restrained. Today, cybersecurity outsourcing is still a rare phenomenon. Instead, many companies prefer to take care of security issues themselves.

Almost everyone has heard about cybersecurity outsourcing, but the detailed content of this principle is still interpreted very differently in many companies.

In this article, I want to answer the following important questions: Are there any risks in cybersecurity outsourcing? Who is the service for? Under what conditions is it beneficial to outsource security? Finally, what is the difference between MSSP and SecaaS models?

readwrite September 26, 2022
Software bill of materials: Managing software cybersecurity risks

Software bill of materials: Managing software cybersecurity risks

As software-related vulnerabilities continue to grow, companies must manage their software cyber risks to innovate faster and create safer, more secure digital products.

Until recently, most companies were unaware of the “ingredients” or code that make up the software that powers their products and enterprise software. This is an issue because third-party code usage is increasing, and the consumption of open-source software (OSS) will accelerate in the years to come.

McKinsey & Company September 26, 2022
The EU unboxes its plan for smart device security

The EU unboxes its plan for smart device security

European Union lawmakers have proposed a new set of product rules to apply to smart devices that’s intended to compel makers of Internet-connected hardware — such as ‘smart’ washing machines or connected toys — to pay fulsome attention to device security.

The proposed EU Cyber Resilience Act will introduce mandatory cybersecurity requirements for products that have “digital elements” sold across the bloc, with requirements applying throughout their lifecycle — meaning gadget makers will need to provide ongoing security support and updates to patch emerging vulnerabilities — the Commission said today.

Tech Crunch September 19, 2022
Remote work cybersecurity: 12 risks and how to prevent them

Remote work cybersecurity: 12 risks and how to prevent them

Expanding attack surfaces, increasing vulnerabilities and overstressed staffs are among a litany of security risks whose ultimate cure requires more than an ounce of prevention.

Remote work is now a standard option for most professionals, but the rising popularity of work from anywhere has driven a corresponding rise in cybersecurity incidents.

Remote work during the COVID-19 pandemic drove a 238% increase in cyber attacks, according to a March 2022 report by Alliance Virtual Offices, which provides services to the remote workforce. And Gartner’s “7 top trends in cybersecurity for 2022” called the expansion of the attack surface that came with remote work and the increasing use of public cloud a major area of cybersecurity concern. Trends such as these have made security improvements for remote employees and risk-based vulnerability management the “most urgent projects” in 2022 for 78% of CISOs surveyed by security software provider Lumu Technologies.

Tech Target September 6, 2022
Good Intentions, Bad Execution: The State Of SME Cybersecurity

Good Intentions, Bad Execution: The State Of SME Cybersecurity

Cybersecurity has a reputation for being difficult—and not without reason. Covid-19, remote-working and geopolitical unrest have exacerbated the problem almost beyond recognition, leaving some of the world’s most powerful corporations scratching their heads. If the big fish are struggling to swim straight, what hope is there for the little guys?

With this in mind, it’s worth taking a look at how U.K. SMEs (small- and medium-sized enterprises) are getting on. How often are they being attacked? What kind of threats are they facing? What are they worried about? What are they doing about it? What should they be doing about it?

Forbes August 22, 2022
Five reasons why blockchain will fortify IoT technologies

Five reasons why blockchain will fortify IoT technologies

Blockchain is nothing new. Originally proposed in 1982, and eventually harnessed in 2008 as the technology behind Bitcoin, blockchain acts as an immutable publicly distributed ledger. Each block cannot be edited and cannot be deleted. It is secure, decentralized and tamper-proof.

These attributes hold immense value for IoT infrastructures, and point the way to a more transparent future. Blockchain technologies can be used to support IoT deployments by improving decentralization, heightening security and bringing better visibility to connected devices.

IoT Business News August 8, 2022
Roundtable on Cybersecurity

Roundtable on Cybersecurity

The strategies companies need to keep their data safe.

As cyberattacks become more sophisticated and harder to trace, it’s critical for companies to be ready for them. Three experts from Chicago’s cybersecurity scene discuss trends in the cybersecurity arena and how companies can better prepare for cyberattacks.

Chicago Business August 1, 2022
Cybersecurity for small and medium businesses: The next frontier?

Cybersecurity for small and medium businesses: The next frontier?

Although SMBs are more aware about cyber threats now, a recent survey shows around 60% SMBs do not consider cyber attacks a huge risk for them and about 40% do not believe that strong security is a priority.

The increasing number of reports of cyber crimes involving small businesses shows that criminals are shifting their focus. Now, banks, financial institutions, and large corporate houses are not their only target, but also easy prey, like small and medium businesses (SMBs) and the common man.

Financial Express July 25, 2022
Cybersecurity is a journey, not a destination

Cybersecurity is a journey, not a destination

Presidio’s Brian Lynch caught up with Julia O’Reilly to discuss the lasting impact of the HSE attack, cybersecurity frameworks, and knowing the value of your own data.

In May 2021, Ireland was subjected to a ransomware attack that forced our national health and social services provider to shut down its entire IT system. The Health Service Executive’s (HSE) systems were targeted with Conti ransomware. The stolen data was ultimately restored after the ransomware group handed over a decryption key without having received the €16.7 million ransom. Speaking at the time, CEO of the HSE Paul Reid said the impact of the attack had put some services back 30 to 40 years.

Tech Central July 18, 2022
Industrial cyberattacks are hitting nearly all IoT companies

Industrial cyberattacks are hitting nearly all IoT companies

IIoT security often takes a back seat, report finds.

Cyberattacks against Industrial Internet of Things (IoT) devices, as well as operational technologies (OT), are widespread, with almost no companies being immune, a new report from Barracuda Networks has claimed.

Tech Radar July 18, 2022
Why We Need Accountability For Effective Cybersecurity Frameworks

Why We Need Accountability For Effective Cybersecurity Frameworks

Andy is CSO for Huawei Technologies USA, overseeing Huawei’s US cyber assurance program.

Recent security incidents violating IT service providers like SolarWinds and Microsoft have brought to the forefront the importance of accountability and transparency in cybersecurity. The sheer volume of recent reports of ransomware attacks, cyber intrusions reportedly perpetrated by nation-states, and largescale data breaches affecting millions of people indicates that cyber defenses must be raised across the board—particularly in critical infrastructure, government and essential services.

Forbes July 12, 2022
Effective IoT security requires collaboration and clarity

Effective IoT security requires collaboration and clarity

IoT brings benefits to business, government and consumers. But those features shouldn’t come at the cost of security or less privacy for its users.

When firefighters arrive at burning buildings, they must contain the blaze, rescue inhabitants and keep calm under pressure. As IoT devices are increasingly deployed throughout cities, firefighters could have access to more information that could save more lives and lead to less lost property through use of real-time data about surroundings impacting people in need.

IoT Agenda - Tech Target July 4, 2022
Integrating blockchain-based digital IDs into daily life

Integrating blockchain-based digital IDs into daily life

Blockchain tech is pushing the boundaries of ID management as governments look for scalable solutions that promote privacy, control and decentralized data management.

The last 13 years have seen blockchain technology evolve into numerous use cases — finance, data, logistics and security, among others. However, the idea of using blockchain’s immutable capabilities to ID humans got new life when Changpeng “CZ” Zhao visited the island country of Palau to kick off its digital residency program.

Coin Telegraph July 4, 2022
Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity

Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video.

This data is collected, collated, stored and analyzed by various organisations, from the big social media companies to app makers to data brokers. As you might imagine, your digital footprints put your privacy at risk, but they also affect cybersecurity.

Telecom June 30, 2022