Data privacy: What your employees don’t know but should

What do employees in your organization understand about security, data privacy, and compliance? According to a recent report from Bothell, Wash.-based MediaPro, perhaps not as much as they should. With data privacy fast becoming a hot-button issue, and the European Union’s General Data Protection Regulation (GDPR) right around the corner, what your employees don’t know…

GDPR Compliance: A Carrot or Stick Approach?

As most of you know, the new General Data Protection Regulation (GDPR) comes into forceon May 25, 2018 and will introduce major new laws for data processing in European Union (EU) member countries and anywhere EU personal data is processed. In other words, even if your business is based in the U.S., if you process data of EU…

Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

Pity the poor password. Maligned for years, it’s nevertheless still hanging on as the dominant form of access and identity protection for online accounts of all types. Despite years of industrywide efforts to educate users about the importance of employing difficult-to-guess passwords, the list of the most frequently used passwords has changed little. One analysis of 10…

Hackers breached German government’s secure computer networks

The Russia-linked Sofacy hacking group has breached the secure computer networks of a number of German federal agencies. The group – also known as APT28, Fancy Bear, and Pawn Storm – has been targeting government institutions, political organizations and military/defense companies around the world for over a decade. Confirmation of the breach The confirmation of…

Road Trip or Road Rash? Compliance, Meet Security

I’ve been on the road a lot lately. Literally, I’ve been in the car, traveling along every kind of road, alongside virtually every type of vehicle you can imagine. And I sometimes found myself noticing things about the people who were driving all those cars, trucks and motorcycles. The motorcyclists were the ones I found…

Fortinet Enhances Network Security OS, Adds AI-based Threat Detection

Two major new product announcements were made at Fortinet’s Accelerate 18 conference this week, including a new machine learning (ML) threat intelligence and detection offering, along with a major upgrade to the Fortinet Security Fabric (FortiOS). Accelerate 18, held in Las Vegas, Nevada, is Fortinet’s annual global partner and user conference, attended by around 2,000…

Virtual Private Networks: Why Their Days Are Numbered

As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether. Virtual private networks (VPNs) have for a generation been viewed as the connectivity solution for the distributed enterprise, enabling secure remote access for mobile workers and branch offices…

A view of the global threat landscape: Cybercrime and intrusion trends

Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, disrupt and destroy systems, according to a new report by CrowdStrike. “We’ve already seen cyber adversaries launch massive, destructive attacks that render organizations inoperable for days or weeks. Looking ahead, security teams will be under…

BEC scammers actively targeting Fortune 500 companies

Nigerian scammers are targeting Fortune 500 companies, and have already stolen millions of dollars from some of them, IBM Security researchers have found. Their strategy is well known: they take over or impersonate a trusted user’s email account to target companies that conduct international wire transfers, and trick accounts payable personnel into wiring money into…