Cyber insurance: trying to quantify risks

Bloomberg Intelligence August 24, 2015 This analysis is by Bloomberg Intelligence analysts Charles Graham and Edmond Christou.  It originally appeared on the Bloomberg Professional Service. Personal data theft, cyber-attacks whet appetite for insurers The value of personal data stored on corporate databases is rapidly increasing. For EU citizens it is set to reach 1 trillion […]

Rate this:

, , , , , , , , , ,

Leave a comment

2015 Best & Worst Tourist Attractions for Mobile Security

Skycure collects data lakes of threat intelligence about the multiple layers of mobility, including device-level, app-level and network-level intelligence, which is beyond the reach of traditional mobile security tools. Types of Attacks The most frequent threat that we identified at the Top 15 Danger Destinations was a WiFi-based attack called SSL decryption, which allows cyber […]

Rate this:

Leave a comment

Personal data in leaked datasets is still personal data – ICO

By Simon Rice, Group Manager for Technology at the Information Commissioners Office (ICO). They say ‘no publicity is bad publicity’, but after spending most of the week trending on Twitter, I wonder if the users of the Ashley Madison site might disagree. Having already prompted a flurry of news stories when the online attack of […]

Rate this:

, , , ,

Leave a comment

64% of Organizations are Potential Targets for Nation-State Cyberattacks

According to a recent survey conducted at this year’s Black Hat USA security conference, nearly two-thirds of organizations are potential targets for nation-state cyberattacks. The survey conducted by Tripwire, which includes responses from 215 conference attendees, also found that 86% of those questioned have seen an increase in these targeted attacks directed at their network […]

Rate this:

, , ,

Leave a comment

Cybersecurity: The Looming And Growing Threat

Corporate legal spending on cybersecurity issues hit $1 billion last year, according to the BTI Legal Spending Outlook. It’s easy to see where this money is going: By 2018, more than 50% of organizations will use outsourced providers for security, Gartner predicts. Here are seven trends expected to impact CIOs, law firms, and their clients […]

Rate this:

, , , , , , ,

2 Comments

BYOD: Only half of SMBs that allow employees to access corporate data with personal devices have policies in place

Rate this:

, , , , ,

Leave a comment

5 steps to respond to a security breach

Is your organisation equipped to deal with potential financial and reputational damage following an attack?  Has your organisation established an incident management plan that covers data breaches? Recent evidence shows that organisations are ill-equipped to deal with an attack. Australian bulk deals website, Catch of the Day, suffered a security breach in 2011, with passwords […]

Rate this:

, , , , , , ,

Leave a comment

Follow

Get every new post delivered to your Inbox.

Join 1,786 other followers