Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.
Dan Swinhoe |
21 Jan |
Read more
Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.
Dan Swinhoe |
13 Jan |
Read more
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about.
Dan Swinhoe |
13 Nov |
Read more
The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned?
Dan Swinhoe |
28 Oct |
Read more
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting.
Dan Swinhoe |
26 Jul |
Read more
Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted.
Dan Swinhoe |
26 Jun |
Read more
After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk.
Dan Swinhoe |
18 Apr |
Read more
Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.
Dan Swinhoe |
11 Apr |
Read more
Iranian-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.
Dan Swinhoe |
29 Mar |
Read more
After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter.
Dan Swinhoe |
18 Mar |
Read more
A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are preventable.
Dan Swinhoe |
13 Feb |
Read more
Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.
Dan Swinhoe |
21 Aug |
Read more
Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.
Dan Swinhoe |
14 Aug |
Read more