Business security


272 articles

Ukraine Crisis – Digital Security Resource Center

The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security

The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security

Ukraine Crisis – Digital Security Resource Center

The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security

Highlights from the last seven days in information security include ESET’s latest trends report (In)security Everywhere and the ongoing cyberattacks against Ukraine’s electric power industry.

Editor25 Jan 2016


Critical Infrastructure

Countries remain unprepared for cyberattacks on nuclear facilities

Countries remain unprepared for cyberattacks on nuclear facilities

Critical Infrastructure

Countries remain unprepared for cyberattacks on nuclear facilities

Nuclear facilities across the world have little or no real security mechanisms in place to deal with cyberattacks, according to new analysis.

Narinder Purba21 Jan 2016


Ransomware

Ransom32, a new Filecoder in sight

Ransom32, a new Filecoder in sight

Ransomware

Ransom32, a new Filecoder in sight

A new ransomware named Ransom32 poses as Google Chrome and is distinguished from similar threats by its weight.

Sabrina Pagnotta08 Jan 2016


Critical Infrastructure

UK and US banks to face transatlantic cyberattack test

UK and US banks to face transatlantic cyberattack test

Critical Infrastructure

UK and US banks to face transatlantic cyberattack test

Banks in the UK and US will be tested on how capable they are in coordinating a transatlantic response to a cyberattack.

Narinder Purba05 Nov 2015


Critical Infrastructure

Germany's Industrie 4.0 – the challenges in IT-Security

Germany's Industrie 4.0 – the challenges in IT-Security

Critical Infrastructure

Germany's Industrie 4.0 – the challenges in IT-Security

Time after time we have experienced revolutions in our societies, in the way we work and thus in the Industry. In the past we have been through several Industrial Revolutions and now it’s seems to be the time for another.

Raphael Labaca Castro03 Nov 2015


Ransomware

Ransomware: To pay or not to pay?

Ransomware: To pay or not to pay?

Ransomware

Ransomware: To pay or not to pay?

The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?

Peter Stancik30 Oct 2015


Critical Infrastructure

ENISA to invest in emerging smart critical infrastructure security

ENISA to invest in emerging smart critical infrastructure security

Critical Infrastructure

ENISA to invest in emerging smart critical infrastructure security

Enhancing security in emerging smart critical infrastructures will be a key focus areas for the European Union Agency for Network and Information Security in 2016.

Karl Thomas28 Oct 2015


Business Security

The big small business security challenge: mobile and BYOD

The big small business security challenge: mobile and BYOD

Business Security

The big small business security challenge: mobile and BYOD

In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

Cameron Camp07 May 2015


How To, Business Security

The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

How To, Business Security

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Lysa Myers20 Mar 2015