Building trust and partnerships on proactive cybersecurity, By Inyene Ibanga
Cybersecurity is one of the significant challenges in the contemporary world. Given the increasing level of digitalisation and virtual connectivity, cybersecurity and cyber threats have become inevitable issues confronting everyone who ventures into cyberspace. Cybercriminals are exploiting the opportunity to launch cyber-attacks on individuals, organisations, and vital public infrastructure.
Mission-critical Cybersecurity for Industrial-grade Wireless Networks
Authentication is a method used to validate that a device or user is authorized to gain network access and that the source of data is genuine. Authentication is an important aspect of industrial security linked to process availability—and can be more important than the concept of encryption. Devices within a network must be authenticated and industrial-grade wireless networks should support device authentication.
Questions and Answers: Strengthening cybersecurity of wireless devices and products
The Commission is concerned that the design of wireless devices sold in the EU does not guarantee a sufficient level of cybersecurity, personal data protection and privacy of their users. In recent years, products have been identified on the EU market that take advantage of a weak level of security of certain categories of wireless devices and are vulnerable to attacks or theft of personal data, or allow recording of children’s play.
MORE Alarming Cybersecurity Stats For 2021 !
Earlier this year I wrote a FORBES article called “Alarming Cybersecurity Stats: What You Need To Know For 2021.” Alarming Cybersecurity Stats: What You Need To Know For 2021 (forbes.com) It included an assortment of stats on the increase in threats to our digital wellness as companies, governments, and consumers.
Cybersecurity: A game of cat and mouse
For many years, cybersecurity has been a key priority for organisations. However, even with increased investments and advancements in technology, cybersecurity looks to remain a cat and mouse game.
Why are there So Few Women in Cybersecurity?
The stepping stones for women in cybersecurity date back to the 1940s, when the computer industry was still in its nascent stage. Brave women dubbed as ‘code girls’ worked secretly in wartime intelligence during the World War II breaking codes for the Army and Navy. These women were the precursors of what we now call women in cybersecurity.
Cybersecurity Training Trends 2021
Cybersecurity training trends reflect the urgent need for organizations of all sizes to harden their infrastructure against increasing external and internal attacks. In 2020, some 37 billion records were compromised in nearly 4,000 reported data breaches, according to RiskBased Security’s 2020 Year End Data Breach QuickView Report.
Report: Fostering a diverse cybersecurity workforce
The range of backgrounds and experiences among the workforce directly impacts the mission in cybersecurity, experts said during an event focused on the diversity of the cybersecurity workforce hosted by the Aspen Institute’s Tech Policy Hub and Aspen Digital on Sept. 9.
The growing cybersecurity menace that is Droppers-as-a-Service
Droppers for hire are delivering bundles of malicious and unwanted content to targets looking for cracked versions of popular business and consumer applications, according to new research from Sophos.
Failing to Meet Cybersecurity Standards Can Have Legal Consequences for Companies
Cybercrime is one of the most significant threats facing companies today. With the average cost of a data breach reaching an all-time high of $4.24 million, the business case for cybersecurity has never been stronger. Still, some businesses seem to misunderstand the urgency of meeting current cybersecurity standards.
Why Space Is The Next Frontier For Cybersecurity
With projects like Blue Origin and SpaceX, private-sector innovators like Jeff Bezos and Elon Musk are pursuing outer space endeavors at seemingly breakneck speed.
How Did the Cybersecurity Ecosystem Get So Clogged Up?
Today’s enterprise operations involve the coordination of several different digital ecosystems but none quite so inflamed as the cybersecurity ecosystem. Technology has been evolving at a rapid pace, and attackers are armed with advanced tactics to steal data and expose secure information.
Most Employees Took Cybersecurity Shortcuts During the Remote Working Period Despite Understanding the Risks
A report on employee cybersecurity practices found that most workers took cybersecurity shortcuts despite knowing the risks involved.
5 Cybersecurity Tactics To Protect The Cloud
Cybersecurity and risk management have moved on top of the boardroom agenda. According to a Gartner survey 61 percent of chief information officers (CIOs) are increasing their investment in cyber and information security.
Don’t Let False Positives Sink Your Cybersecurity Strategy
When you think about the must-have capabilities for organizational cybersecurity, spotting attacks and rapidly taking action to prevent them is at the top of the list. It’s almost as important, though, to pay attention to the flip-side of that proposition — and ensure your cybersecurity tools are able to identify risky behavior without flagging harmless activity as potentially malicious.