Tag: Cyber Attack

IT Managers lack visibility into almost half of network traffic

IT managers lack visibility to about 45% of their organization’s network traffic, creating significant security challenges.

List of data breaches and cyber attacks in March 2018

Healthcare breaches are common – but the number of incidents this month is insane. See the list of data breaches and cyber attacks in March 2018.

Supply chain cyber attacks up 200% in 2017

Cyber criminals ramped up attacks on supply chains last year, with incidents rising by 200%, according to a new report.

List of data breaches and cyber attacks in February 2018

Cyber criminals seem to have shifted their focus to ransomware. See the list of data breaches and cyber attacks in February 2018.

List of data breaches and cyber attacks in January 2018

The first list of 2018 is by no means a short one. See all the data breaches and cyber attacks in January 2018.

Winter Olympics site taken out for 12 hours

Visitors to the official website of the Winter Olympics were left high and dry over the weekend after a cyber-attack made it unavailable for around 12 hours.

List of data breaches and cyber attacks in December 2017 – 33.8 million records leaked

Data protection is more than just protecting data from the unauthorised: it’s about ensuring it’s used for the sole purpose it was collected, and respecting the privacy of those whose data it is.

10 key Information Security mistakes organizations make! How to fix them?

See the 10 worst mistakes which are common to find, and important to address in the path of mature information security posture.

List of data breaches and cyber attacks in November 2017 – 59 million records leaked

This month’s list is a little thin compared with other months this year. Is that a good sign? Maybe.

5 computer security facts that surprise most people

Every company is completely and utterly owned by a nefarious hacker or easily could be.

Complexity: A next generation global cyber weapon

A new exotic application of the QCM technology! A text by Jacek Marczyk.

How to be a tech security Jedi: 5 lessons from the original Star Wars movies

There are tons of subtle parallels between Information Security and the original Star Wars movies.