Industry

Cyber risks contributed by your supply chain

There is nothing new about the risk of cyber-attacks on IT and Industrial Control Systems (ICS). About a decade ago, people believed that cyber-attacks can only be launched through the internet and adopted the principle of air-gap-isolated systems. The famous Stuxnet attack (2010) was the first strong indication that cyber-attack on IT and ICS (known as Operation Technology- OT) organizations can be also launched internally after the adversary entered your facility.

The real cost of a cyber breach at your company…..Do CEOs really know?

Consider the top five most significant expenses that a business has to manage after a breach.

Remediation

In 2017 the Ponemon Institute reported it takes more than six months for an organization to find out they have had an intrusion and another 55 days to contain it. Remediation does not necessarily mean the attack has been completely stopped, either, as some attacks remain dormant and undetected.

Loss of customers

Cyber Awareness tips

Cyber security awareness contains a comprehensive and rounded perception of online threats and the potential steps you can take to mediate risk. Regardless of the operating systems used and data that you work with through a myriad of vulnerabilities, hackers can get hold of sensitive information.

Penetration Testing will save Countless Lives: The Cisco Vulnerability

Embedi researchers have this week uncovered a critical vulnerability in Cisco software that left Cisco employees and researchers sleep-deprived, until it was fixed. Researchers demonstrated this susceptibility at a Hong Kong based conference after reporting it to Cisco in May 2017 in a video demonstration. The affected hardware and software includes devices that fall into the Smart Install Client type.

The Future of Programming Human Resources

Increasingly, would-be programmers can participate in coding boot camp and learn the basics in 18 months.

This isn't to say, anyone can become a coder, they can't, in the same way that not everyone can become a Lawyer, Doctor or Accountant – even if the country you live in is willing to give you loans to pay for your education. Apart from having the smarts, you need to have a good basic grasp of IT. It takes a certain type to fill the title of Programmer, but the opportunity is very much there.

Where are the Women in Cyber Security?

The study conducted by the Center for Cyber Safety and Education showed that of all the workforce in the US information security field, only 14 per cent are women. This was an all-time low considering that 48 percent of the US workforce are women. Although the report found out that cyber security is a field that is facing acute shortage of professionals of both sexes, the shortage of women was alarming in comparison to their male counterparts.

Top Women in Cyber Security

Privacy in the Facebook Era

Hot off the heels of the recent Facebook Cambridge Analytica Scandal, the gateway to the Facebook problem has been pried open for all of us.

While some are swearing off Facebook permanently and shareholders are panicking, the majority of us, who may not have Facebook stock, but definitely have Facebook accounts are feeling a little uneasy about our data privacy.