Advertisement

FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.


A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.


Gourav Mukherjee, managing partner, Immersion Security

How one healthcare CISO is navigating the COVID-19 crisis

Security is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.


Advertisement

cio 100 big

London

The CIO 100 is a showcase of the crucial technology projects, IT strategies, innovations, ideas, change management and transformation initiatives CIOs in and from the UK are delivering to customers, organisations, partners and sectors.

2020 01 13

The May Fair Hotel, London

The inaugural CSO30 is a celebration of the role of the CSO and recognises the leading security executives in the UK.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.


gavel court ruling

Supreme Court rules Morrisons not liable for data breach caused by rogue insider

Courts rule in Morrisons favour after a disgruntled insider leaked information, setting a precedent around insider threats and data breaches but also leaving questions unanswered.


Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.


Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

Weakness in Zoom for macOS allows local attackers to hijack camera and microphone

Zoom's use of insecure system APIs allow attackers to elevate privileges as well.


secured vpn tunnel

What is WireGuard? Secure, simple VPN now part of Linux

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography, and now it's built into Linux 5.6. Is it ready for the enterprise?


Advertisement

IDG Insider Pro  >  Tech Career Ladder [podcast / 3:2 / 2400 x 1600]

Tech Career Ladder podcast: Start your climb to EPIC leader

In Insider Pro’s inaugural Tech Career Ladder podcast, Sandy Silk -- director of Information Security, Education, and Consulting at Harvard University -- joins host Maryfran Johnson to discuss what it takes to become an EPIC leader....


CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Attack campaign hits thousands of MS-SQL servers for two years

Newly discovered Vollgar attack uses brute force to infect vulnerable Microsoft SQL servers at a high rate.


security risk - phishing / malware / social engineering

How to prepare Microsoft Office and Windows for ransomware and email attacks

You've set up your remote workers during this COVID-19 crisis, but have you made the adjustments to be prepared for a cyber disaster like a ransomware attack?


Exiting the computing business

5 reasons security staff leave (and what to do about it)

Retaining skilled security staff is difficult in the best of times, but there are steps you can take that will make a difference.


healthcare technology / medical data

UK healthcare struggles to keep pace with evolving cybersecurity threat landscape

The WannaCry incident spurred The National Health Service and UK healthcare providers to improve their cybersecurity posture, but experts say more work needs to be done.