How to make sure your data doesn’t crash and burn

The dangers of public Wi-Fi are already well known, but the security issues of in-flight Internet connection are still somewhat obscure. Typically there’s no password protection on the Wi-Fi connection, so persons with malicious intent can intercept data that’s being transmitted on the wireless network quite easily. Airplanes are unique hacking grounds more dangerous than…

Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

Since IBM X-Force published its report, “Security Attacks on Industrial Control Systems,” last year, we have observed a startling increase in the number of attacks against these systems. According to IBM Managed Security Services (MSS) data, attacks targeting industrial control systems (ICS) increased over 110 percent in 2016 over last year’s numbers, as of Nov….

IDG Contributor Network: Increasing the cybersecurity workforce won’t solve everything

On Dec. 1, 2016, the Commission on Enhancing National Cybersecurity delivered its report to the President of the United States, providing six Imperatives and a number of associated recommendations and action items to improve the overall security posture of the nation’s public and private infrastructures. These recommendations cover the gamut of both technical and non-technical…

Four Cybersecurity Resolutions for 2017

2016 was a big year for cyber-security news, most of it not terribly encouraging. Still, the year did present the cyber-security industry with several teachable moments that I believe all security professionals should heed as we move into a new year. Accordingly, I’ve made four New Year’s resolutions for the cyber-security industry in 2017. If…

Cybersecurity is a chess marathon with hackers: Carl Herberger

Apps are an integral part of any business today. Radware, a security and availability solutions provider, is protecting the organizations globally from cybercrime, including DDoS attacks. “We have a phenomenal track record of innovating in security and bringing great partnerships on the table for our end customers. Also we lead the availability solutions area which…

Medical data: Accessible and irresistible for cyber criminals

How valuable is personal healthcare data? Apparently it depends. Based on at least some price comparisons on the Dark Web – the underground online marketplace for cyber criminals – electronic health records (EHR) are not even close to premium goods. McAfee, now a division of Intel Security, reported recently that the price for an individual medical…

It’s Time For Organizations To Automate Security

Dishwashers are a great invention; they use automation to do a repetitive, high-value task that does not require much skill. It is time to bring your security team out of the 1970s and stop making them wash the cybersecurity dishes by hand. The addition of automation to washing dishes has several benefits, besides eliminating the…

IDG Contributor Network: Putting the privacy into cybersecurity at DHS

Security and privacy have an awful lot in common; both disciplines care deeply about the confidentiality of personally identifiable information. Attend a cyber-security conference or a privacy conference, you are likely to hear the same catch phrases “[Security/privacy] is best addressed at the earliest stages of system development, not at the end when retrofitting requirements…

IDG Contributor Network: Grid security insights for 2017: Pressure mounts to prevent physical attacks

As we close out 2016 and look forward to 2017, it seems appropriate to pause a moment and provide some grid security predictions for the new year. Predictions based on trends, insight, and understanding can arm security programs with the knowledge needed to test policies, exercise physical protection systems, and allocate corporate funds for resources….

Only 25% Companies Equipped To Handle Data Breaches

Research by Tripwire on cybersecurity challenges reveals only 3% organizations outsource security issues to experts. A survey by Tripwire has revealed that despite a hike in IT budgets, companies continue to struggle with cyber-security: just one quarter of respondents say they have the ability to handle data breaches.