Search Results

Cloud Security

Target Breach Reveals Risk of Business Partners

It is well known that the Target breach cost the company $148 million and resulted in the resignation of the company’s CIO and CEO. Less well-known, is the fact that the attackers exploited an unsecured heating and cooling (HVAC) vendor with trusted digital connections to Target in order to circumvent Target’s security ...

Enterprise

Governments need to act on critical national infrastructure cybersecurity threats

Cyberattacks on critical national infrastructure have the potential to cause massive damage and disruption to entire nations. And research suggests that the threat is growing. A recent survey of CNI organisations in North and South America, for example, reveals 43 per cent have seen an increase in cyberattacks over the ...

Cloud Security

The Legal Precedent Requiring Encryption in the Cloud

In one survey after another about the adoption of cloud computing, CIOs and other technology leaders readily admit that their top concern is data security. There is a growing number of government and industry regulations and standards designed to help protect the confidentiality of data that companies have in their care. The ...

Executive Perspectives

White Networks

Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services.  In contrast to a ...

Enterprise

4 hidden economic costs of cybercrime

There are many obvious and headline-grabbing costs of cybercrime. There are many obvious and headline-grabbing costs of cybercrime. In the past few months alone there have been numerous high-profile data security breaches where hackers have obtained tens of millions of customer details, ranging from credit card numbers to medical records. ...

Identity Protection

What is Criminal Identity Theft?

Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012, over 16.6 million Americans were victims of identity theft. What most people don’t know is that identity theft is much more than just stealing your credit card number. In other posts, I discussed ...

Consumer Threat Notices

A Connected Nation: IoT in America in 2025

If there’s one thing that remains consistent about technology, it is that it’s always in flux. From tablets to phablets, smart cars to smart TVs, our devices are getting increasingly “smarter” and entwined with our daily routines. To better understand the consumer perspective on these ever-evolving technology trends, we conducted ...

Executive Perspectives

11 Steps to Improve your Personal Digital Security

 Everyone with an account on a smart phone, tablet, laptop or PC also knows about phishing, scamming, password and identity theft, and to some degree, file intrusion and hardware destruction through advanced malware. Probably less well known is the fact that savvy hackers will focus on individuals in specific businesses ...

Cloud Security

Just What the Doctor Ordered

Cloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike Research. Certainly healthcare service providers are getting on the cloud services bandwagon, either by choice or ...

Enterprise

Backup Security Best Practices

Network and mobile data breaches get much of the publicity today, but there’s another less publicized avenue susceptible to both insider and outsider attacks: backup. In early April, for example, Emory Healthcare in Atlanta lost the personal information of 315,000 patients when it discovered that 10 backup discs were missing. ...

Subscribe to McAfee Securing Tomorrow Blogs