The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
We’re living in a new era of cyber-threats - and governments have started to take notice. To protect the information of their citizens, they’re implementing new regulations that hit businesses where it really hurts. Here’s what you need to know.
2017 brought some of the most damaging cyber-attacks and volume driven data breaches the world has ever seen. Detailed profiles have been built on nearly every individual in the United States posing a threat to each consumer and organization. A wave of cyber crime is coming our way in 2018 like never seen before. How will you respond?
Even with some of the largest breaches taking place recently, amid the deluge of attacks around the world and targeting all industries, the WannaCry and Petya attacks may earn a hashmark in a historical for changing for forcing the security community to reconsider its posture.
Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.
When it comes to thinking about cyber-attacks, many of the folks running businesses are relying on a heavy combination of faith ("it won't happen to us"), reliance on cyber-insurance ("any losses will be covered"), and the unfounded belief that the long-term consequences won't be that bad ("if it does happen, we'll be back in business in no time"). Alas, every single one of those ideas is simply wrong.
Insurance expert Bill Kelly of Argo Pro provides his insights on the WannaCry ransomware cyber attack and how companies of all sizes can work with insurance providers to find appropriate coverage in order to best protect themselves ahead of the next big cyber attack.
When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.
When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.