Why Unidirectional Security Gateways can replace firewalls in industrial network environments

Unidirectional Gateway solutions come in pairs: the TX appliance contains a laser, and the RX appliance contains an optical receiver. The Gateway pair can transmit information out of an operations network, but is incapable of propagating any virus, DoS attack, human error or any information at all back into the protected network. Waterfall agent software…

Traveling on business? Beware of targeted spying on mobile

Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take sensitive corporate data. This is especially true if they are not careful with their mobile devices. The targeted malware attack It may sound like something out of a…

Capgemini Leaks Data of Recruitment Firm PageGroup

Job-related information belonging to hundreds of thousands of individuals was exposed online after Capgemini inadvertently made public a database of Michael Page, a brand of UK-based global recruitment company PageGroup. France-based Capgemini, which last year had a revenue of nearly 12 billion euros, specializes in consulting, technology and outsourcing services. The company, contracted by the…

Breaking down New York’s new cyber regulations

In late September, the New York Department of Financial Services (NY DFS) and Gov. Andrew Cuomo announced a series of new rules strengthening cybersecurity requirements for financial firms in the state of New York. Financial firms are treasure troves of private client data and one of the most sought after targets for attackers. In the…

Tech groups push policy priorities for the Trump administration

Technology trade groups are already pushing out their policy priorities for President-elect Donald Trump’s administration, even though his campaign rarely touched on IT issues. With Silicon Valley largely opposed to Trump during the campaign and his tech policy agenda paper thin, policy recommendations from tech trade groups may be an exercise in wishful thinking. Still,…

The cybersecurity gap between IT capabilities and business expectations

Deloitte has uncovered a shift in business priorities from “business performance” to “customers,” with 57 percent of chief information officers choosing “customers” as their top priority, compared to only 45 percent last year. “Customer” remained the top priority for eight of the 10 industries represented in the survey. Only 45 percent of CIOs stated their…

Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones in order to block the ever increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been given a $275,000 grant from the National Science Foundation to help them work on a possible solution: malware-detecting CPUs. This project, titled “Practical Hardware-Assisted Always-On…

A Trojan from Google ads

If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do not install apps from unofficial stores are not well-enough protected. New developments suggest that malware can be found even on an absolutely legitimate site, as…