Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Cyber Security


Category

Integrating blockchain-based digital IDs into daily life

Integrating blockchain-based digital IDs into daily life

Blockchain tech is pushing the boundaries of ID management as governments look for scalable solutions that promote privacy, control and decentralized data management.

The last 13 years have seen blockchain technology evolve into numerous use cases — finance, data, logistics and security, among others. However, the idea of using blockchain’s immutable capabilities to ID humans got new life when Changpeng “CZ” Zhao visited the island country of Palau to kick off its digital residency program.

Coin Telegraph July 4, 2022
Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity

Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video.

This data is collected, collated, stored and analyzed by various organisations, from the big social media companies to app makers to data brokers. As you might imagine, your digital footprints put your privacy at risk, but they also affect cybersecurity.

Telecom June 30, 2022
Rethinking organizational cybersecurity strategy for corporations

Rethinking organizational cybersecurity strategy for corporations

Many articles were written describing the practical steps companies should do to improve their cyber status. From the relevant technologies, to the main algorithms, following the concepts and concluding with the correct methodologies. Practical recommendations as well as long term efforts are described in detail in various documents and programs. Behind a program usually stands a deep strategy that represents the organizational priorities and philosophy.

CTECH June 30, 2022
Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity

Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video.

ET Telecom June 21, 2022
Why diversity is vital for a strong cybersecurity team

Why diversity is vital for a strong cybersecurity team

Cybersecurity is portrayed as a high-stress environment with cutthroat competition, says Deepa Kuppuswamy, information security architect at ManageEngine.

The pandemic has transformed the workplace and the way businesses and consumers use digital technologies. The attack surface has expanded greatly with the hybrid work model, and the cybersecurity industry has evolved to address the associated risks.

Gulf Business June 21, 2022
How To Maintain Cybersecurity in FinTech Companies?

How To Maintain Cybersecurity in FinTech Companies?

When a fintech company becomes a target for a cyberattack, there’s more than just finances at stake. A successful attack will irrevocably damage a company’s relationships with its customers, ruin trust, and break compliance with security standards. Therefore, maintaining high cybersecurity standards is paramount for any participant in the fintech market.

In this article, we’re going to take a look at the main cybersecurity threats that endanger fintech companies, the most important regulations, and policies to comply with, and consider some practices for implementing banking custom software to enhance a company’s levels of security.

Analytics Insight June 21, 2022
How To Inspire Employees To Care About Cybersecurity

How To Inspire Employees To Care About Cybersecurity

Humans are the weak link in cybersecurity. With the increased complexity of cybersecurity and threats, a company’s own employees continue to be a major vulnerability. With more than 15 billion devices in circulation—including computers, servers and mobile phones operating worldwide—digital fluency and literacy remain challenges in the transforming cybersecurity landscape.

Forbes June 13, 2022
Cybersecurity should be more complex than 123456

Cybersecurity should be more complex than 123456

It’s essential to protect yourself against cyber attacks in the world we live in today. Here’s just one example that should make you think twice about better security:

Several bugs in Microsoft, Ubuntu, and Tesla products were found and exploited during a hacking conference in Vancouver.

Yes, they have hacking conferences.

Cyber security is easy to disregard but should be at the top of your list to protect yourself or your business. Just one breach could be catastrophic.

The Apopka Voice June 8, 2022
Why higher education should care about cybersecurity

Why higher education should care about cybersecurity

Higher education institutions worldwide have increasingly been the target of cyberattacks in the last two years, posing a substantial threat to learning standards and scientific data preservation. High-profile attacks on institutions in recent years have put the education industry on high alert.

In February this year, the Gems group of schools in the UAE alerted parents of enrolled students about a cyberattack on the group’s website. Fortunately, thanks to their robust business continuity plans, impact on their operations was minimal, but many educational institutions aren’t quite so lucky.

Gulf Business May 30, 2022
Top 10 Common Cybersecurity Vulnerabilities That You Should Be Aware Of

Top 10 Common Cybersecurity Vulnerabilities That You Should Be Aware Of

Security threats are quite common these days and every business tries hard to stay away from the same. However, to get to the point, no business is safe from a security attack. This guide would talk about the top 10 common cybersecurity vulnerabilities that you should be aware of.

Analytics Insight May 16, 2022
How Cybersecurity Will Accelerate IoT’s Growth

How Cybersecurity Will Accelerate IoT’s Growth

We expect the 2020’s decade to be defined by near-ubiquitous connectivity. All types of devices in our homes, workplaces, and cities are expected to be internet-enabled to seamlessly capture and transmit data. Semiconductors costs have declined over 90% over the last decade, making such connections remarkably inexpensive. And the rollout of 5G will allow data to transfer between devices and the cloud virtually instantaneously, at speeds up to 100 times faster than 4G.

Nasdaq May 16, 2022
How artificial intelligence is influencing the cybersecurity world

How artificial intelligence is influencing the cybersecurity world

Cybersecurity is a strategic challenge for global enterprises today. The rapid digitization, accelerated by the pandemic, has brought forth an expansion in the attack surface thereby stressing on the need for more autonomous cybersecurity defenses. Many CISOs are making a fundamental shift to an interconnected and perimeter-less ecosystem.

DATAQUEST May 9, 2022
Organizations face cybersecurity debt for not prioritizing cybersecurity

Organizations face cybersecurity debt for not prioritizing cybersecurity

When organizations accelerate their digital transformation due to the pandemic two years ago, many did not prioritize cybersecurity. In fact, organizations were focused mostly on ensuring business continuity and avoiding any disruptions to productivity.

As the pandemic continued, investments in tech became long-term, with the focus on providing seamless and agile working operations. Companies adopted newer technologies to remain relevant. However, there was one problem, cybersecurity remained an afterthought.

TechWire Asia May 2, 2022
The Next Cybersecurity Crisis: Poisoned AI

The Next Cybersecurity Crisis: Poisoned AI

A lot of machine learning relies on massive data sets of unknown provenance. That’s a problem when digital defenses are on the line.
For the past decade, artificial intelligence has been used to recognize faces, rate creditworthiness and predict the weather. At the same time, increasingly sophisticated hacks using stealthier methods have escalated. The combination of AI and cybersecurity was inevitable as both fields sought better tools and new uses for their technology. But there’s a massive problem that threatens to undermine these efforts and could allow adversaries to bypass digital defenses undetected.

Bloomberg April 25, 2022
Surprising cybersecurity weak points business owners should look out for

Surprising cybersecurity weak points business owners should look out for

Cybersecurity has taken on new levels of importance facing redoubled cyber attacks. The post-pandemic digital landscape is fraught with threats. In fact, these attacks peaked in December of 2021 with a slew of Log4j exploits. The popular Java-based logging utility is only one surprising cybersecurity weak point that business owners should look out for, however.

Venturebeat April 19, 2022