This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

How To Beat Cybercrime’s Prey-and-Pay Villains

Cybercrime pays, so much so that successful cybercriminals now run their operations like a business, complete with technical support centers, in-house training, and HR. To protect your digital assets, you need to approach your cybersecurity like a business, and not as a one-time point solution that is bolted onto existing infrastructures, programs, and procedures.

What’s Under Your Hood? Security & the Connected Car

Picture this: you’re driving your newly purchased, fully equipped, top-of-the-line automobile. You’ve just filled your tank, thanks to the crowd sourcing app GasBuddy, and you’re about to begin the commute to work. But first— coffee. Thanks to SYNC3, Ford’s latest infotainment system, you easily order by stating “Alexa, ask Starbucks to start my order.” Your…

8 Older Companies Doing New Things in Security

The security space is growing with startups building game-changing technologies in identity management, training, privacy, and other niche areas to drive the future of security. This year is a big one for new companies trying to make a name for themselves in the industry. From a security investment standpoint, the first two quarters of 2017…

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Know your threats: the nine scariest malware monsters

It’s been a particularly ghoulish year in cybersecurity, from Russian hacks to ransomware outbreaks. The bad boogey man in the black hoodie has been pulling one over the collective public. It’s dark and creepy, but users refuse to stop peeking behind the door. It’s enough to make even the most grizzled IT admin run for…

Seagate launches SkyHawk AI, the first HDD for AI-enabled surveillance

Seagate announced its SkyHawk AI hard disk drive, the first drive created specifically for artificial intelligence enabled video surveillance solutions. SkyHawk AI provides bandwidth and processing power to manage always-on, data-intensive workloads, while simultaneously analyzing and recording footage from multiple HD cameras.

How to identify every type of phishing attack

Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent transactions, or to trick someone into downloading malware. In early 2016, 93 percent of phishing emails delivered ransomware, according to statistics from PhishMe.

Offshore law firm Appleby confirms data breach

Appleby, a major offshore law firm based in Bermuda, has confirmed it has suffered a data security incident in 2016 that resulted in some of their data being compromised. It’s doubtful that the wider public would have ever known about this were it not from the US-based International Consortium of Investigative Journalists (ICIJ) and partner…