
Authentication today: Moving beyond passwords
A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience …

Human trafficking victims forced to defraud Chinese computer users
Late last week, the Croatian police executed a coordinated raid on two houses where 59 individuals were confined and forced into defrauding Chinese and Taiwanese computer and …

GDPR: Whose problem is it anyway?
With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good …

HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics
The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it’s packed with cutting edge research on a range of attack and …

Norwegian health authority hacked, patient data of nearly 3 million citizens possibly compromised
Hackers have breached the systems of the Southern and Eastern Norway Regional Health Authority (Helse Sør-Øst RHF), and possibly made off with personal information and health …

Why GDPR will drive a best practice approach
When GDPR was first discussed, many feared that it would force businesses to act more insular and become more defensive about their data. Some even believed there would be a …

Strong security simplifies compliance for French operators of vital industry
In 2014, France’s National Agency for the Security of Information Systems, or ANSSI, issued two detailed cybersecurity guidance documents for Industrial Control Systems: …

More than half of US-based employees have never heard of GDPR
With the General Data Protection Regulation (GDPR) deadline approaching, new research from MediaPro shows more than half of US-based employees have never heard of the …

Building a program for GDPR compliance: Can you answer these key questions?
The clock is ticking and the General Data Protection Regulation (GDPR) will start to be enforced in May. Now is a critical time for organizations to plan, budget and make any …

2018: The year of the NIS Directive
In 2017 the GDPR buzz reached peak intensity, even in the cybersecurity community. It practically drowned out any mentions of another important upcoming EU law: The Network …

Security company Fox-IT reveals, details MitM attack they suffered in September
Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …

CLTRe join the race to be crowned as a Tech Trailblazer
CLTRe have been selected as a finalist in the Firestarter Trailblazer category in the Tech Trailblazers Awards. The shortlists have been selected by a panel of leading IT …
Featured news
Resources
Don't miss
- AI voice hijacking: How well can you trust your ears?
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input