Subscribe Archives >

Hackers Use IoT Botnets to Launch Massive Attacks

1 week ago | by Tony Kontzer

The recent ransomware attack on an Austrian Hotel's room key system may have served as a wake-up call about the expanding risks introduced by the internet of things, but, as they say in show... Read More



  • Data Breaches Affect Customer Loyalty
    Online security is full of holes, according to a recent survey of 9,000 consumers in the United States and 10 other countries. Most consumers who are active online—nearly six out of 10— believe they will be a victim of a data breach at...
  • Addressing the IT Security Skills Gap
    Today's cyber-threats present challenges for even the most tech-savvy IT executives in the most tech-savvy organizations. It's not news that the volume and velocity of threats continue to grow. At the center of the problem? Recruiting and retaining...
  • Why Cyber-Security Strategies Are Falling Short
    While organizations around the world are more confident than ever that they can predict and detect cyber-attacks, they're still falling short on investments and plans geared toward recovering from a breach. Such is the double-edged finding of EY's...
  • Cyber-Attackers Target IP Assets
    The state of cyber-security has gone from bad to worse over the past couple of years. Not only are threats increasing in both frequency and intensity, they're also becoming more dangerous and costly. A recent study conducted by Deloitte,...
  • Managing Personal & Work Identities in the Office
    The use of personal devices and personal accounts in the workplace has changed IT and enterprise security in profound ways. Today, employees think nothing of logging onto Facebook, Twitter and Instagram while at work, as well as accessing myriad...
  • Why Augmented Reality and the IoT Increase Risks
    A significant number of organizations are adopting wearable technology, digital navigation and other forms of augmented reality (AR) to drive business, according to a recent survey from ISACA. The accompanying report, "2016 IT Risk/Reward...
  • Is Enterprise Security Lost in the Cloud?
    The debate about whether to migrate to the cloud is largely over—and the cloud won. Yet, as adoption rates grow and IT systems become more interconnected with cloud architectures, the challenge of locking down security is growing. Overall,...
  • Phishing & Ransomware: Attackers' Favorite Weapons
    A review of recent headlines provides the latest reminder that organizations are under siege. Companies like ADP, LinkedIn and Yahoo—as well as federal agencies such the FBI and IRS—have reported substantial breaches this year, and the...
  • Companies Must Balance Speed and Security
    The need for speed is forcing many organizations to confront an inconvenient truth: While security is clearly critical to business, many enterprise leaders are still willing to cut corners and take risks. An October 2016 study conducted by Coleman...
  • DevOps and Security Teams Are Still in Silos
    In theory, a DevOps culture stressing communication between software developers and IT operations professionals can improve application security by enabling organizations to find and fix issues more frequently and earlier in the process. In...

Security Archives >

Manage your Newsletters: Login   Register My Newsletters