Tuesday, March 19, 2019
isBuzz

What Mounting Cybersecurity Threats Mean For Your Business

Hacking has always been a problem for businesses and governments around the world. They have tried to upset the balance and induce fear amongst people while, simultaneously, trying to either get rich or win loyalty. Some major attacks on...
isBuzz

The Three Big Ways iOS App Development Will Change In The Next Five Years

I have always loved Heraclitus’ teaching of, “No man ever steps in the same river twice.” It is a reminder of the impermanence of life. Though the Greek who lived 2500 years ago was speaking in broad terms, he...
isBuzz

The Biometric Smart Card: Connecting The Digitally Excluded

Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as...
isBuzz

Blue Whale – Still Offering Advice

The debate on the subject of self-half images hosted on Instagram seems to have got lost in translation by the Press, MP’, and the incumbent Agencies who are supposed to be empowered to look after the on-line welfare of...
isBuzz

Correction To Last

‘The debate on the subject of self-half images hosted on Instagram seems to have got lost in translation by the Press, MP’, and the incumbent Agencies who are empowered to look after the on-line welfare of young people. Here,...
isBuzz

7 Misconceptions About DDoS Attacks That Could Jeopardize Your Business

Rolf Gierhard, VP of marketing at Link11 busts the most dangerous and pervasive myths about DDoS attacks – and shows how organizations can protect against them Most organizations understand that DDoS attacks are disruptive and potentially damaging.  But many are...
isBuzz

Why The Time Is Now For A Security-First Culture

Connectivity means financial service providers can have a wider customer reach than ever before – but with more touchpoints comes a greater potential for complexity, and also an increased risk of security breaches. An integrated approach has therefore never...
isBuzz

Is SS7 The Security Flaw We Should All Know About?

It can be very frustrating when you’re asked to enter your details multiple times into your online banking, only to be told again that your bank can’t confirm who you are. Usually, the bank will then send either an...
isBuzz

The Cyber Resilience Model

For too long, organisations have sought the holy grail of 100% Cyber Security. But security is never absolute; it is essential to understand that a breach is inevitable. It is the way in which organisations respond to a cyber...
isBuzz

How To Cut IT Spending If You Run A Small Business

Most people who decide to launch their own small business often run into the exact same IT related issues. This article provides a few practical tips to address the biggest concerns and avoid typical mistakes in this regard. From...
isBuzz

High Value Data, High Exposure

It is a known-known fact that one of the most valuable assets we may own and have access to is money. However, my opposition argument to this statement is that there is another asset, which has even more intrinsic...
isBuzz

Fingerprint Biometrics: The Key To Brand Differentiation

Traditional payment card issuers are under pressure. Once secure and established, they are now challenged on all sides. The digital transformation of our world lets small, audacious brands set up and trade with ease. With mere clicks they fill...
isBuzz

Why The First 24 Hours Is Critical In Managing A Cybersecurity Incident

Over the past couple of years there has been a meteoric rise in cybersecurity incidents and it’s only a matter of time before the inevitable occurs in your organisation. Whether hit by a Distributed Denial-of-Service (DDoS) attack or infected by...
isBuzz

Under Lock And Key: How Can The Public Sector Keep Its Data Safe?

The public sector faces intense public scrutiny, especially when it comes to cybersecurity. However, the launch of the National Cyber Security Centre in (NCSC) in 2016 suggests that the sector is beginning to take the issue of cybersecurity seriously,...
isBuzz

Farewell To Text Password

We are witnessing a critical turning point in the history of identity assurance – transition from the time-honored seals, autographs and textual passwords towards Expanded Password System. The worst part of the global password predicament will melt away when...
SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent...
SC Magazine

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited...

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.