Cybersecurity

News, trends and insights for cybersecurity in the digital age

La industria Cloud se prepara para la llegada de los drones al sector público

Te guste o no, los drones públicos están a punto de llegar. De hecho, la organización Cloud Security Alliance (CSA), dedicada a asegurar los entornos informáticos en la nube ha comenzado a trabajar con la iniciativa global sin ánimo de lucro, Securing Smart Cities, para establecer las normas que guiarán los futuros aviones no tripulados […]

Secteur public : les drones débarquent, les leaders du cloud se préparent

Que cela vous plaise ou non, les drones s’apprêtent à faire leur entrée dans le secteur public. La « Cloud Security Alliance » (CSA) s’est alliée à une initiative mondiale à but non lucratif, Securing Smart Cities, pour mettre en place les premiers éléments qui permettront le déploiement des drones dans le secteur public. Leur rapport, coécrit […]

Password managers: Secure tool or single point of weakness?

password security CSC Blogs

Let’s face it: Passwords are not only a hassle, they also don’t make the most effective locks. The average person has dozens of username and password combinations to remember. People who are very active online have hundreds of such combinations. It’s just impossible to remember them all, and that’s a big reason why people tend to use the same password […]

Why consumer-market leader Android is an enterprise runner-up

android in enterprise-CSC Blogs

Google’s Android mobile operating system dominates the global consumer smartphone market with an 88% share through the third quarter of last year, compared to a 12% share for Apple’s iOS. The race is much closer in the U.S., where Android’s market lead in the three months ending in November 2016 was 55% to 44%, according […]

Enterprises could (but often don’t) do this one thing to dramatically reduce risk

email phishing CSC Blogs

What is the one technique involved in almost every security breach? Phishing. Nearly every major breach starts with some sort of phishing attack, in which nefarious individuals send reputable-looking emails with the goal of getting the recipient to reveal information or click on a malicious link. Perhaps it’s an assistant opening what he or she thinks is a contract for […]

What’s trending in healthcare IT based on HIMSS17?

The same week the stars assemble for the Oscars, there’s a similar gathering of luminaries in the healthcare technology (HIT) sector. HIMSS, the largest trade association in the world for HIT professionals, is now the 5th largest trade show in America, with over 45,000 attendees and 1,000 exhibitors. There’s already a waiting list to exhibit at […]

Suspected botnet author arrested

A 29-year-old man thought to have been involved in the Mirai botnet malware used in a series of devastating attacks during the second half of last year has been arrested. As the BBC reports in Router hacker suspect arrested at Luton Airport, the man was arrested under a European Arrest Warrant at the request of the […]

Clouds cast long security shadow over enterprise IT

cloud shadow IT CSC Blogs

If you need more evidence that shadow IT is taking hold in enterprises, look no further than the most recent Intel Security Cloud Report. The headline finding is that roughly 40% of cloud services are bought and used without the involvement of enterprise IT. We’ve known that shadow IT has been a problem for quite awhile, but I […]

New Mac malware on the loose: What you need to know

MacOS malware CSC Blogs

In the past week, two relatively crude threats to Mac users have surfaced. The malware targets Apple’s operating system, now called MacOS. The first piece of malware, analyzed by researchers Claudio Guarnieri and Collin Anderson and dubbed MacDownloader, was used as part of an attack that targeted the U.S. defense and aerospace industries. The attackers created a fraudulent […]

Municipal drones are coming — and cloud leaders are getting prepared

Drones and Enterprise IT CSC Blogs

Like it or hate it, government drones are coming to your block. The Cloud Security Alliance (CSA), a leading organization dedicated to ensuring a secure cloud computing environment is working with Securing Smart Cities, a nonprofit global initiative focused on smart city cybersecurity, to set up drone guidelines. Their report, co-authored by the CSA Internet of Things (IoT) […]