eCommerceNews UK - Technology news for digital commerce decision-makers

Opinion stories - Page 126

Thinkstockphotos 671978144

A short history of the computer password

Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
Thinkstockphotos 599477738

How to protect your organisation from WannaCry ransomware

Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Thinkstockphotos 680737980

Big changes in the infosec landscape: Time to take note and take action

Mon, 15th May 2017
#
malware
#
breach prevention
#
cybersecurity
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
Thinkstockphotos 587802732

The rise of ransomware in Southeast Asia

Fri, 12th May 2017
#
malware
#
ddos
#
ransomware
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia.
Thinkstockphotos 612237188 1

What we can learn from the Google Docs hack

Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Thinkstockphotos 513704129

The do's and don'ts of responding to ransomware

Thu, 11th May 2017
#
malware
#
ransomware
#
cybersecurity
Ransomware set to increase in volume and variety in 2017, but a smart incident response strategy can help prevent losses.
Thinkstockphotos 616890412

Fingerprint security & biometrics: Three major myths busted

Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Thinkstockphotos 497906538

Firebox Cloud: Public cloud security for small and midsize businesses

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
Small and midsize firms bolster cyber defences with Firebox Cloud, bringing enterprise-level security to the public cloud.
Thinkstockphotos 479631160

Fake Chrome extensions inject code into web pages

Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Roi abutbul   from raw data to actionable intelligence the art and science of endpoint security

From raw data to actionable intelligence: The art and science of endpoint security

Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Thinkstockphotos 491324833

Young cybercriminals 'more motivated by peer respect than financial gain'

Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Thinkstockphotos 512691636

Carbon Black asks: So what exactly is threat hunting?

Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
​Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Thinkstockphotos 642442154

Women in cybersecurity: Slowly but surely, change is coming

Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Thinkstockphotos 475507032

Why stakeholder collaboration is key to your cloud success

Fri, 21st Apr 2017
#
devops
#
apm
#
cybersecurity
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.
Thinkstockphotos 510691579

Around 17 million websites are already powered by WordPress - are they secure?

Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 187890557

Don't buy the elixir of youth: Machine learning is not magic

Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Gettyimages 586936882

Making design thinking an 'always-on activity'

Wed, 12th Apr 2017
#
martech
#
assurity
#
opinion
When operated as a continuous routine process with your customers, design learning cycles will help inform your fundamental business strategy.
Thinkstockphotos 469918032

Strategy for cyber crime: own the routers, own the Internet

Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.