Tuesday, May 21, 2019
isBuzz

GDPR: The Best Strategy For International Businesses

The EU’s General Data Protection Regulation (GDPR) was created with the aim of homogenising data privacy laws across the EU. GDPR also applies to organisations outside the EU, if they monitor EU data subjects, or offer goods and services...
isBuzz

From Cinema To Reality – Three Things Every Business Can Learn From Disaster Movies

We all enjoy thinking about ‘what if’ scenarios – what if the sun stopped shining? Or what if an alien spacecraft landed on Earth? This is probably why disaster movies are so popular.  They somehow suspend our disbelief, generate excitement...
isBuzz

Turkish Law On Data Breaches GDPR Report

Turkey’s first comprehensive data protection law was being launched in April 2016. The 2016 Law on the Protection of Personal Data (“Turkish Data Protection Law”) is based largely on EU Data Protection Law. As a candidate state for EU membership,...
isBuzz

Survey Says: Microsoft Migration Isn’t As Easy As It Sounds

A recent survey-report commissioned by 1E, Getting Your House in Order, was completed by 600 senior IT decision makers in the US and UK, split evenly between IT Operations and IT Security specialists. The intent was to see if,...
isBuzz

Access Control — Why Fingerprints Are Better Than Keys

Authentication is any process whereby an individual proves that they are who they claim to be, and in an increasingly digital world, authentication is the key to protecting both connected and unconnected assets. We need it to keep out...
isBuzz

Evolving Mobile Device Management Strategies

As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever growing device estate. Successfully managing the complexity of multiple software and hardware mobile platforms necessitates...
isBuzz

Why Prediction, And Not Detection, Is The Key To Reducing Email Risk

According to the Global Risk Report by the World Economic Forum, the threat of cyberattacks are now among the top three global fears identified by world economic leaders, along with natural disasters and terrorism. Such concerns are clearly warranted, as research from...
isBuzz

Three Practical Steps To Improving Your Company’s AI Cybersecurity Skills

Much like the rest of the business world, cybersecurity teams are increasingly hearing how AI will revolutionise the way they work – usually for the better. And it’s no longer just hype – recent research from LinkedIn showed that machine learning jobs are on the rise,...
isBuzz

Cyber Liability Insurance – How MSPs Can Ensure They Follow The Right Protocols For Protection

The number of data breaches and the level of cyber-attacks are continuing to rise. According to Absolute Market Insights “it is estimated that over the next five years, cybercrime could potentially cost companies US$ 5.2 trillion every year.” In line...
isBuzz

How To Overcome 3 Key Challenges Of Shared Responsibility In The Cloud

The cloud is changing the nature of business with a powerful approach to streamlining operations and staying current with the latest technology. But as the saying goes, with great power comes great responsibility. In this case, that responsibility breaks...
isBuzz

What Are The Barriers To A Cashless UK?

In many ways, the UK is progressing towards becoming a cashless society. Despite this, there is a range of barriers threatening to undermine the UK’s ability to fully embrace this transition. From a lack of trust in new technology...
isBuzz

How Will AI Affect Wireless Networks And Cybersecurity In 2019 And Beyond?

Artificial intelligence (AI) has huge potential for wireless networks and for the people that must protect — as well as those who try to attack — them. It’s a rapidly changing landscape, and in this article, I explain how...
isBuzz

Spyware In The IoT – This Year’s Biggest Security Threat

Malware is everywhere, infecting nearly one third of all computers in the world today. It’s ready to do damage to you, your computer or your data in ways that seem to be limited only by the dark ingenuity of hackers. Ransomware,...
isBuzz

UK Businesses Bullish With Data Governance

In the world of data governance, the only certainty is uncertainty. Headline regulations such as GDPR have been keeping CEOs up at night since 25th May 2018. However, while all are bound by GDPR’s legislation – none are more...
isBuzz

Intentionally Insecure: Poor Security Practices In The Cloud

So far this year, there have been five documented cases of organisations exposing their private data due to misconfigured S3 buckets or cloud databases. Wait, let’s fix that: due to intentionally configured S3 buckets and cloud databases. The distinction is...

Amnesty sues maker of Pegasus, the spyware let in by WhatsApp zero day

Amnesty International, which was sent the Pegasus spyware via a WhatsApp message, is seeking to stop NSO Group’s "web of surveillance."

Rats leave the sinking ship as hackers’ forum gets hacked

The OGUsers forum, which trades in hijacked social accounts, has been hacked, its hard drives wiped, and its user database published online.
SecurityWeek

US Warns Chinese Drones May Steal Data: Report

Washington has warned that Chinese-made drones could be giving spy agencies in Beijing "unfettered access" to stolen data, according to a report in American media. The Department of Homeland Security sent out an alert on Monday flagging drones built in...
The Register

iPhone gyroscopes, of all things, can uniquely ID handsets on anything earlier than iOS 12.2

Cheapskate fandroids get a pass on this one, though Your iPhone can be uniquely fingerprinted by apps and websites in a way that you can never clear. Not by deleting cookies, not by clearing your cache, not even by...
Bruce Schneier

How Technology and Politics Are Changing Spycraft

Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story; cell phone and other electronic surveillance techniques make tracking people easier; and machine learning will make all...