The Hottest Issue in Business and Personal Technology
Curated by Mike Briercliffe - @mikejulietbravo
Convenience vs Security - The Challenge of #IoT
Originally written by Nick Ismail on Information Age
Bromium, Inc. has today released new research which found the productivity cost of security education for large enterprises is at an all-time-high of $290,033 per year per organisation, and that user education is rocketing up the CIO’s priority list. Yet despite those investments, the end user remains the greatest risk to the organisation’s security from
The post Is cyber security education a waste? appeared first on Information Age - Insight and Analysis for IT Leaders.
A study conducted in July by Dimensional Research examined how organizations are addressing the cybersecurity skills gap. Study respondents included 315 IT security professionals at U.S.-based companies with more than 100 employees. According to the study, 93 percent of security professionals are concerned about the cybersecurity skills gap, and 72 percent believe it is more difficult to hire skilled security staff to defend against today’s complex cyberattacks compared to two years ago. Significantly, 81 percent … More →
Government officials and corporate executives alike realize that technology has become a globally connected, booming industry. Despite what that fact may mean for the American intelligence and national security supply chain, agencies must embrace it because the U.S. government isn’t the R&D powerhouse it was many decades ago. “That’s already the way of the world. […]
The post Adapt or die: The national security implications of a globalized tech market appeared first on Fedscoop.
AFS Technologies shares its experience of helping Carlsberg realise its ambition for perfect store execution through its software.
The post The benefits of applying ‘the perfect store’, big data and IoT appeared first on FoodBev Media.
Getty Images Alt Text
Heart patients in US and abroad risk attack due to security flaw
Thursday, August 31, 2017 - 3:56pm
Chubb has broadened its enterprise risk management options for Chubb commercial cyber policyholders in the United States and Canada. Two new policy forms, Cyber Enterprise Risk Management (Cyber ERM) and DigiTech Enterprise Risk Management (DigiTech ERM), combine cyber insurance with …
A list of device IPs and credentials has gone viral since Thursday, kicking off an effort by researchers to notify the owners of these connected devices before they're hacked.
The researchers, Cesar Cerrudo and Lucas Apa of cyber security firm IOActive, said the vulnerabilities would allow hackers to spy on users, disable safety features and make robots lurch and move violently, putting users and bystanders in danger.
While they say there are no signs that hackers have exploited the vulnerabilities, the fact that the robots were hacked so easily and the manufacturers’ lack of response raises questions about allowing robots in homes, offices and factories.
“Our research shows proof that even non-military robots could be weaponized
Only two per cent have 'comprehensive' training in dealing with cyber incidents