Artificial Intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices such as voice-controlled personal assistants and self-directed vacuum cleaners, through to groundbreaking business applications that optimise everything from drug discovery to financial portfolio management. Naturally, observes Delfina Chain, there’s growing interest…
Flashpoint
-
-
The subject of ‘The Insider Threat’ is fast rising up on the corporate agenda. While you might think a company’s own employees would be less likely to pose security risks than external attackers, a recent analysis by Computing has found that this type of threat…
-
Data breaches are costly. According to a recent study conducted by The Ponemon Institute, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made…
-
Business risk is foundational to business risk intelligence, but it’s also commonly misunderstood because its scope extends far beyond what security practitioners typically deal with on a daily basis. Broadly speaking, asserts Josh Lefkowitz, business risk refers to the possibility of experiencing lower revenue or a…
-
For executive protection teams tasked with safeguarding business leaders in what is now an increasingly complex threat landscape, having rapid access to relevant information is essential. However, as more threat actors shift operations online – and often to illicit, exclusive communities and platforms – many…
-
Last year, we witnessed one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on 12 May, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service (NHS) to deal…
-
Cyber criminals target job listings portals in bid to recruit “unwitting mules” for fraud
by Brian SimsJob listing and recruitment portals have been an attraction for cyber criminals given the volume of personal information uploaded to those sites in the form of CVs, cover letters and other data specific to individuals, but there’s more to criminals’ interest than just stealing personally identifiable…
-
Few threats expose the true interdependency of cyber and physical security more than those targeting the oil and natural gas (ONG) sector, writes Josh Lefkowitz. After all, oil and natural gas together account for 53% of the world’s energy consumption and remain integral determinants of both global…