off

Cyber risks associated with new technology “to become mainstream” in 2020

Infosecurity Europe has asked its community of C-Level security professionals what they think the year ahead has in store. The list includes a range of challenges, opportunities and broader trends across technology, business and the world. Many of the participating CISOs have...
Posted On 17 Dec 2019
off

“Account checking Armageddon close at hand in New Year” warns Blueliv

Liv Rowley, threat intelligence analyst at Blueliv, has shared details of the company’s predictions on the biggest cyber threats likely to develop in the New Year, from account checking Armageddon through to Monero cryptocurrency mining. With users continuing to re-use the...
Posted On 29 Nov 2019
off

“Cyber crime becoming bolder and shifting in focus” asserts Europol report

Europol’s 2019 cyber crime report provides insights into emerging threats and key developments. Cyber crime is continuing to mature and becoming more and more bold, shifting its focus to larger and more profitable targets as well as new technologies. Data is the key element in...
Posted On 11 Oct 2019
off

Armor’s Black Market Report shows Cyber Crime-as-a-Service to be “thriving”

Cloud Security-as-a-Service provider Armor has released its annual Black Market Report which shows that Cyber Crime-as-a-Service is thriving, with cyber criminals staying ahead of the game by offering a raft of new goods and services – and even after-sales support. Armor’s Threat...
Posted On 10 Sep 2019
off

5G: The Need for Next Generation Security to Combat Cyber Threats

Rest assured that 5G is coming. It promises to be faster with less latency and better support for applications such as the Internet of Things (IoT) than any of its predecessors, asserts Gunter Reiss. It will be strikingly faster than 4G, and this will be particularly obvious when...
Posted On 07 Aug 2019
off

Blocking DDoS Attacks: Cutting Down on Response Times Using Automation

Distributed Denial of Service (DDoS) attacks can be catastrophic, but the right knowledge and tactics will drastically improve the host organisation’s chances of successfully mitigating such episodes. Here, Adrian Taylor explores the five ways in which automation can...
Posted On 10 Jul 2019
Josh Lefkowitz
off

Bringing Security Intelligence to the Board

Data breaches are costly. According to a recent study conducted by The Ponemon Institute, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is...
Posted On 29 May 2019
off

Security IT Summit offers Best Practice advice on cyber security regimes

The Security IT Summit – taking place on 2 July at the Hilton Hotel, Canary Wharf in London and for which Risk Xtra is an Official Media Partner – is a ‘must attend’ for senior professionals responsible for protecting their organisations from cyber attacks and for the...
Posted On 01 Apr 2019
Adrian Taylor
off

Combating the Threat to 5G Services: Empowering Next Generation Smart Devices

For the telecoms industry, 2019 is the year of 5G writes Adrian Taylor. Service providers are in a race to roll-out 5G services that will empower the next generation of smart devices and the Internet of Things (IoT). With its massive increase in bandwidth speeds, ultra-low...
Posted On 18 Feb 2019
off

The Importance of Business Risk to the Enterprise

Business risk is foundational to business risk intelligence, but it’s also commonly misunderstood because its scope extends far beyond what security practitioners typically deal with on a daily basis. Broadly speaking, asserts Josh Lefkowitz, business risk refers to the...
Posted On 05 Feb 2019