Expert corner

 
 
(IN)SECURE Magazine
IoT

IoT data exchange: Building trust and value

The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or trust how their IoT data is being managed and used. This conclusion has …

hospital

Taking the physician’s pulse on cybersecurity

More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to Accenture and the American Medical Association (AMA). This, along with additional findings, signals a call to action for the …

watch

Emerging trends companies should prepare for in 2018

Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better prepare for emerging threats, Experian Data Breach Resolution released …

industry

Whitepaper: Top 20 cyber attacks on ICS

The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. Essentially, such risk assessments evaluate a typically large inventory of possible cyber attacks against the …

Hacking Team

US man is behind the 2015 Hacking Team hack?

Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the hack, a 30-year old Nashville, Tennesee resident might have had something …

Don't miss

Malware news

Privacy news

 
(IN)SECURE Magazine