Security News
Big incidents will be BIG. High-visibility attacks will continue to be rare, but when they occur, they will be major news, with massive implications for customers and even wider society, depending on the organization affected. Unlike the indiscriminate "Spray-and-pray" attacks we used to be so afraid of, bad actors will shift their attention to building sophisticated campaigns to take down high-value targets that are more financially rewarding for them.
"Attacks targeting external vendors and partners are a constant threat," said Joel Molinoff, BlueVoyant's global head of Supply Chain Defense. "Our data suggests that the scope of the problem is increasing, with more enterprise vendors and suppliers falling prey to cyber attacks. Enterprises recognize the issue but the standard approach to third-party risk management is proving inadequate. Companies now need to focus energies on methods that proactively illuminate and reduce supply chain risk."
Soon we will be able to unlock and start our cars from our phones. Steve Durbin November 28, 2023 3:42 PM. The article has an odd error - Tesla did not abandon phone keys for the Model 3, it's the standard way most people access their cars.
98% of organizations globally are facing a cloud skills gap, specifically in trying to find people with general cloud skills, cloud architecture knowledge, and adapting, monitoring, and troubleshooting for the cloud, according to a report by SoftwareOne. Over the past four years, a rapid increase in cloud adoption has led to 94% of organizations utilizing at least one cloud provider, with the majority opting for hybrid or multi-cloud setups.
Digital transformation projects are top of mind for enterprises. 91% of businesses are currently engaged in some form of digital initiative.
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious Generative AI, like FraudGPT and WormGPT. These rogue creations, lurking in the dark...
Volex, the British integrated maker of critical power and data transmission cables, confirmed this morning that intruders accessed data after breaking into its tech infrastructure. Volex produces power cords, plugs, connectors, electric vehicle charging components, consumer cable harnesses and power products, datacenter power cables, high speed copper interconnect cables, and more.
The ongoing face-off between Washington and Beijing over technology and security issues has taken a new twist, with China accusing the US of hacking into the servers of Huawei in 2009 and conducting other cyber-attacks to steal critical data. China's Ministry of State Security made the allegations in a posting on WeChat, claiming that in 2009 US intelligence services "Began to invade servers at Huawei headquarters and continued to monitor them."
Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. According to the Forrester study, "Enterprise organizations have traditionally been less focused on managing machine identities compared to human ones, partly because they have different requirements and more complicated lifecycle and security challenges. These digital certificates offer authentication and protect sensitive information. Yet, few are confident in successfully layering and managing identity security across machines and navigating responsibility assignment for privacy and security."
In your opinion, what misconceptions about digital signatures prevent wider adoption, and how can these be effectively addressed? These signatures are neither secure nor legally valid, and people have learned from their legal councils that they need to use paper for relevant signatures.