You are viewing 19 of 25 results
news

Time to accept printers will leak data

Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses…

published 14 - June - 2021
Read More
news

Watch this space

Satellites support so much of our business infrastructure, but being in space doesn't make them…

published 02 - June - 2021
Read More
news

Ransomware Is Everywhere — Here’s What You Need To Consider

Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the…

published 01 - June - 2021
Read More
news

How Cyber Security Criminals Exploit the 'Accidental Insider'

In the first of his regular new information security columns for Security Middle East, Daniel…

published 14 - April - 2021
Read More
news

Cybercrime to Scale New Heights in 2021: What Can You do About it?

By Steve Durbin, Chief Executive of the ISF With the pandemic precipitating a rapid acceleration…

published 08 - February - 2021
Read More
news

Five Threat Vectors Destined To Make Waves In 2021

By Steve Durbin, CEO of the Information Security Forum, and Forbes Business Council Member Building…

published 20 - January - 2021
Read More
news

Ransomware attacks target backup systems, compromising the company ‘insurance policy’

The success of ransomware is reliant on whether or not the target organization has patched…

published 16 - December - 2020
Read More
news

Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand

Payment of a ransom is also a contentious discussion – in many cases the ransom…

published 11 - December - 2020
Read More
news

Websites Requiring Security Software Downloads Opened Door to Supply Chain Attack

I, for one, am wary if a website asks me, unprompted, to download anything. It…

published 07 - December - 2020
Read More
news

CISA Warns Public About Online Holiday Shopping Scams

Also, beware of email “offers” from companies you don’t recognize and even those that you…

published 04 - December - 2020
Read More
news

Qbot Banking Trojan Now Deploying Egregor Ransomware

Organizations should have an incident response or crisis management plan for ransomware events, knowing who…

published 26 - November - 2020
Read More
news

CISA: Ransomware Activity Targeting the Healthcare and Public Health Sector

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 19 - November - 2020
Read More
news

Imminent Cyberthreat Could Disrupt Hundreds of US Healthcare Systems

Basic cyber hygiene standards need to be met, covering patching and updates, network segmentation, network…

published 16 - November - 2020
Read More
news

FBI: Hospitals and Healthcare Providers Face Imminent Ransomware Threat

The healthcare services have an outdated approach to security awareness, education, and training... Daniel Norman,…

published 11 - November - 2020
Read More
news

Why ransomware has become such a huge problem for businesses

Anyone with access to the Dark Web can buy readily available ransomware kits for less than $100.…

published 04 - November - 2020
Read More
news

Norway Alleges Russia Orchestrated Parliament Email Hack

The attacking state will build user profiles, understand patterns of behavior and then they will…

published 30 - October - 2020
Read More
news

UHS Hospitals hit by Ryuk ransomware, forced to shut down systems

Attackers will once again turn their attention to disrupting the health service by targeting poorly…

published 15 - October - 2020
Read More
news

How Criminals Use Artificial Intelligence To Fuel Cyber Attacks

By Steve Durbin, Managing Director of the Information Security Forum, and Forbes Business Council Member…

published 14 - October - 2020
Read More
news

Suspected Ransomware Takes Out Major US Healthcare Provider

Privacy should also be a high priority for anyone handling sensitive information, considering the shift…

published 12 - October - 2020
Read More
news

Georgia Election Data Hit in Ransomware Attack

Typically, the success of ransomware is reliant on whether or not the target organization has…

published 03 - October - 2020
Read More
news

The Future's Biggest Cybercrime Threat May Already Be Here

By Steve Durbin, Managing Director, ISF Current attacks will continue to be refined, and what…

published 04 - August - 2020
Read More
news

Information Security Forum Releases Updated Guide to Security Best Practices

The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The…

published 11 - May - 2020
Read More
news

Vishing and Cybercriminals during COVID-19

The COVID-19 pandemic has resulted in an upshot of all types of scams. In the…

published 05 - May - 2020
Read More
news

Understanding the CFO’s Cybersecurity Role in the Age of COVID-19

Senior executives understand that today’s global economy is still not adequately protected against cyberattacks, despite…

published 04 - May - 2020
Read More
news

If Remote Working is the New Norm, How Do We Do it Securely?

“My biggest concern is when remote workers enter phase three since it is unlikely that…

published 14 - April - 2020
Read More
news

FBI: COVID-19-Themed Business Email Compromise Scams Surge

"Criminals have become more sophisticated by considering the psychological aspects of an attack," says Mark…

published 08 - April - 2020
Read More
news

As coronavirus spreads, cybersecurity staff contend with increasing attacks, remote workers

As the COVID-19 pandemic continues to spread, cybersecurity professionals have never been busier. Despite some reports of cybercriminals…

published 24 - March - 2020
Read More
news

15 Coronavirus Online Scams to Watch Out For

“Our appetite for information is vast and cybercriminals know this so there may be attachments…

published 23 - March - 2020
Read More
news

European Electricity Association Confirms Hackers Breached its Office Network

ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of…

published 17 - March - 2020
Read More
news

Security Think Tank: Bug bounties are changing the image of hackers

The traditional picture of a hacker is of a script kiddie in a hoodie hunched…

published 03 - February - 2020
Read More
news

Five Reasons Why Supply Chain Security Must be on Your Agenda

How do you know that the critical parts inside your servers and devices are not…

published 20 - January - 2020
Read More