Data

Vulnerabilities in GPS tracker could put 1.5 million vehicles in danger

Vulnerabilities in GPS tracker could put 1.5 million vehicles in danger

The six vulnerabilities found could give bad actors complete access to the vehicle’s system, with potentially devastating consequences Add bookmark A GPS tracker that has been sold to customers across 169 countries and has been installed in more than 1.5 million devices has been revealed to have numerous critical cyber security vulnerabilities that could allow bad actors to remotely hack the vehicle’s system. These critical cyber security issues in the MiCODUS MV720 were first discovered by cyber security startup BitSight. Following the discovery of the vulnerabilities, BitSight informed CISA, the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency…
Read More
$450 Mn Cybersecurity Investment Fund Formed

$450 Mn Cybersecurity Investment Fund Formed

An increase in threats and cyber-attacks against enterprise systems, data and personnel requires an investment in innovative organizations to provide defensive solutions. ForgePoint Capital is answering the challenge by announcing Fund II, the industry's largest fund focused exclusively on cyber security. ForgePoint will invest up to $450 mn in early-stage and select growth companies addressing the industry’s most pressing cyber challenges. Fund II focus areas will include cyber intelligence, privacy, security services and infrastructure protection. Fund Anticipates Global Demand For More Cyber Solutions The venture fund believes that enterprise security professionals understand how the current market is fragmented. Market research…
Read More
How to choose a data discovery solution

How to choose a data discovery solution

Find out why your organization should be leveraging an effective data discovery solution Add bookmark We respect your privacy, by clicking "Download Your Copy" you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. You have the right to object. In addition, you will receive our e-newsletter, including information on related online learning opportunities. For further information on how we process and monitor your personal data, and information about your privacy and opt-out rights, click here. Download Your Copy Consumers, employees, enterprise…
Read More
Add More Relevant Attack Detection To Your Threat Intelligence

Add More Relevant Attack Detection To Your Threat Intelligence

Accelerate Cyber Response with Near-Real Time DNS Insights Add bookmark We respect your privacy, by clicking "Download Your Copy" you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. You have the right to object. In addition, you will receive our e-newsletter, including information on related online learning opportunities. For further information on how we process and monitor your personal data, and information about your privacy and opt-out rights, click here. Download Your Copy Cybersecurity teams use a variety of sources to…
Read More
The Role Of Human Factors In Enterprise Cyber Security

The Role Of Human Factors In Enterprise Cyber Security

Only 1 Percent Of Attacks On Critical Network Infrastructure; Majority Of Attacks On People Add bookmark We respect your privacy, by clicking "Download Your Copy" you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. You have the right to object. In addition, you will receive our e-newsletter, including information on related online learning opportunities. For further information on how we process and monitor your personal data, and information about your privacy and opt-out rights, click here. Download Your Copy Cyber criminals…
Read More
The IT guide to data security and governance

The IT guide to data security and governance

This guide outlines ways to protect data against breaches and ensure their regulatory compliance Add bookmark We respect your privacy, by clicking "Download Your Copy" you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. You have the right to object. In addition, you will receive our e-newsletter, including information on related online learning opportunities. For further information on how we process and monitor your personal data, and information about your privacy and opt-out rights, click here. Download Your Copy The Covid-19…
Read More
Data Privacy 2021: How Data Privacy is Becoming a Strategic Priority

Data Privacy 2021: How Data Privacy is Becoming a Strategic Priority

The data privacy landscape is changing. In response to public outcry, states such as Virginia and California are now enacting comprehensive data privacy laws aimed at protecting consumer data.  Big tech companies such as Google and Apple are making data privacy part of their value propositions to customers. While Google recently announced it’s phasing out cookies and developing a new “privacy-first” web, Apple is giving users more control over how their data is used by 3rd party apps. Alongside this, they’re currently rolling out a massive “data as a human right” PR campaign to promote these new features.  A new…
Read More
Global Data Protection and Security Laws At-A-Glance: Regulation

Global Data Protection and Security Laws At-A-Glance: Regulation

Personal data protection and privacy law is rapidly evolving in the United States and across the world. However, while some regions, such as the European Union (GDPR), have adopted a more rigid and comprehensive approach, other countries are embracing more sectoral and self-regulated ideologies. Here's an overview of current APAC regulation. In the United states, there is no single principal legislation that governs data protection at the federal level in the U.S. Instead it is a patchwork of hundreds sector-specific and medium-specific laws across the state and federal levels with one exception- CCPA. Global Laws to Know General Data Protection…
Read More
Beijing’s Winter Olympics app found to have significant data flaws

Beijing’s Winter Olympics app found to have significant data flaws

Analysts find China’s MY2022 app may not protect sensitive data input by users Add bookmark An app mandated for use by all attendees of the 2022 Winter Olympic Games in Beijing between 4 and 20 February 2022 has been found to have a significant flaw which leaves much of the sensitive data input into the app vulnerable. Cyber security group the Citizen Lab said in an article published on 18 January 2022 that the flaw means in the MY2022 app “encryption protecting users’ voice audio and file transfers can be trivially sidestepped”. The types of data being input into the…
Read More
IoT Security

IoT Security

Dr. George Antoniou returns as a guest to talk with host George Rettas, president and CEO of Task Force 7 Radio and Task Force 7 Technologies. Dr. Antoniou is the associate professor of cyber security management at Lynn University in Boca Raton, Florida, where his research interests include leadership, developing effective information, security policies, cloud security, IoT security, blockchain identity, access management, and cyber education and awareness. The topic of this episode is Internet of Things (IoT). IoT Explained An IoT device is simply any physical device with a defined purpose that has an operating system and can communicate through…
Read More