Solve fundamental IT issues within your business

IT Governance

As a framework in your business, governing your IT effectively helps ensure your organisation’s IT infrastructure supports and enables the corporate strategies and objectives. Find out more >> Due care is not always taken with IT and information.

IT 86

It's Great to Go Straight

Data Breach Today

Ex-Cybercriminal Brett Johnson Discusses Life as a Keynote Speaker It's good to be legal, according to Brett Johnson, formerly America's most wanted cybercriminal, as he reflects on a year of his experiences speaking at ISMG Summits

IT 153

Is It Time for a Federal U.S. Data Protection Law?


It’s tempting. With an umbrella data protection law, legal and compliance teams (and even everyday businesspeople) would not need to parse as many overlapping legal requirements to figure out what data needs to be managed, how and when it needs to be managed, whom to inform and so on.

IT 84

The IT Governance Cyber Resilience Framework: how it works

IT Governance

It helps organisations protect themselves from cyber risks, defend against and limit the severity of attacks, and ensure that business operations continue to function. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

Maltese bank thwarts huge cyber heist by taking its IT systems offline

IT Governance

At least that was the thinking at the Bank of Valletta in Malta, which last week prevented a daring cyber heist by shutting down its IT systems and plunging the organisation into cyber darkness. Yes, it was cautious (perhaps overly so), but the good news is that plans are adaptable.

IT 91

Growing IT-OT Integration: Addressing the Risks It Brings

Data Breach Today

IBM Security's Paul Garvey on Taking the Right Approach While IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional IT security approaches might fail to address, says IBM Security's Paul Garvey

Risk 130

Ransomware Crypto-Locks Port of San Diego IT Systems

Data Breach Today

Port Remains Open and Accessible to Ships, Officials Say Several days after the Port of San Diego was hit by a crypto-locking ransomware attack, incident response efforts remain underway and many port systems remain offline.

Gartner IT Expo: Augmented Analytics

Perficient Data & Analytics

Our MicroStrategy and BI Expert Jim Butz spoke at the Gartner IT Expo today on the power of augmented analytics. MicroStategy’s approach is to make it easy to embed insights in any channel and any application. Hovering over it gives you key information on Lee Bank.

IT modernization in Government

OpenText Information Management

IT modernization has always been high on the agenda of government CIOs. This gives the potential for great progress to be made if agencies view their IT modernization project as a … The post IT modernization in Government appeared first on OpenText Blogs.

That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards

Krebs on Security

If you own a domain name that gets decent traffic and you fail to pay its annual renewal fee, chances are this mistake will be costly for you and for others. That’s because in June of this year the domain expired, and control over her site went to someone who purchased it soon after.

IT 228

Data Gravity: Will It Weigh Down Cloud Security?

Data Breach Today

The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview

Cloud 122

Secure 2018 US Elections: It's Too Late

Data Breach Today

But here's how the company can get its act together in time for 2020 Facebook's Ex-CSO Says That Ship Has Sailed; Look to 2020 With less than three months to go until the U.S. midterm elections, Alex Stamos, until recently Facebooks's CSO, says there isn't time to properly safeguard this year's elections.

IT 140

Germany makes its cyber capabilities available for NATO alliance

Security Affairs

Germany announced it is going to make its cyber capabilities available for the NATO alliance to help fight hacking and electronic warfare. The post Germany makes its cyber capabilities available for NATO alliance appeared first on Security Affairs.

Facebook Gets Its First Real Privacy Penalty - From Apple

Data Breach Today

Apple's Privacy Warning to Facebook: We Can Break You Apple's conflict with Facebook this week resulted in the most effective and quickest punishment the social network has ever received over a privacy issue. But should a multi-billion dollar tech company like Apple be picking up the slack for the digital privacy enforcement failures of governments

Anatova ransomware – Expert believe it will be a dangerous threat

Security Affairs

The Anatova ransomware outstands for its obfuscation capabilities and ability to infect network shares, it has a modular structure that allows add ing new functions to the malware. Anatova uses the icon of a game or application to trick victims into download and execute it.

It’s Time for Small Businesses to Go Paperless


While it’s good practice to retain hard copies of important documents for several years, it’s a good idea to digitize them as a backup. By now, small businesses are well aware of the risks of keeping records onsite. Growing piles of paper take up space, they aren’t secure, they are a drag on productivity and employees can’t find what they need quickly. Yet despite this knowledge, many small businesses still rely on paper and are reticent to go paperless.

Paper 40

Gartner IT Expo: Create Actionable Intelligence

Perficient Data & Analytics

Along with thyssenkrupp Elevator, they showed that off in a session on Creating Actionable Intelligence here at the Gartner IT Expo. This brings many challenges in understanding what’s happening in the business and acting on it. Did it all in MicroStrategy.

IT 59

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

California's New Privacy Law: It's Almost GDPR in the US

Data Breach Today

But Tech Giants are Taking Aim at the Law, Which Can Be Amended Until 2020 California's legislature has quickly introduced and passed new privacy legislation, making the state's laws the strongest in the U.S.

GDPR 206

China's AI Strategy and its Security Implications

Schneier on Security

Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. There are numerous security -- and national security -- implications

Managing 'Shadow IT' Risks in Healthcare Settings

Data Breach Today

Risk 144

If It Ain’t Broke, Fix it Anyway

Weissman's World

When speaking of technology and information governance, we often are told that “if it ain’t broke, don’t fix it” – or in other words, don’t go looking for trouble where there isn’t any. The post If It Ain’t Broke, Fix it Anyway appeared first on Holly Group.

IT 156

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

There aren’t any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter. Least privilege is expensive to administer but it is effective.

IT 212

Underestimated Risk & Overestimated Security: When All You Do Is React, it May Be Too Late

Data Breach Today

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals.

Risk 162

Russian Indictments: 'It's About Time'

Data Breach Today

Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election

IT 116

AI-Augmented Security: Can Cyberattackers Counter It?

Data Breach Today

XM Cyber's Adi Ashkenazy on the Latest Trends Are cyberattackers working on ways to counter artificial intelligence-augmented security? And will the bad guys ever use AI-driven attacks? Adi Ashkenazy of XM Cyber offers an analysis

Crypto Agility: Its Importance to IoT

Data Breach Today

Ted Shorter of CSS on the Need to Update Cryptographic Keys What is crypto agility, and why is it so important to IoT? Ted Shorter of Certified Security Solutions offers an explanation

IoT 130

When Will GDPR Show Its Teeth?

Data Breach Today

The latest edition of the ISMG Security Report takes a look at the EU's General Data Protection Regulation, including the outlook for enforcement and common misconceptions about its provisions

GDPR 104

Google Takes Its First Steps Toward Killing the URL

WIRED Threat Level

But first, it needs to show you why. Google wants to get rid of URLs. Security

IT 87

Operators of the TheMoon botnet offer it as a service

Security Affairs

Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service. The activity of the TheMoon botnet was first spotted in 2014, and since 2017 its operators added to the code of the bot at least 6 IoT device exploits.

IoT 92

It's End of Life for ASafaWeb

Troy Hunt

The point is that an awful lot has been happening but one thing that hasn't been happening is that I haven't been upgrading ASafaWeb which is why, as of today, it's reached end of life. And I put a lot of work into it, at least in the early years.

IT 85

Legacy Content Migration: The Crowd Has it Wrong

Weissman's World

A few weeks ago, I used this space to wonder how top-of-mind content migration is among organizations whose legacy solutions are more than 8 years old – which, it turns out, accounts for more than 75% of those in service.

IT 190

Banking Malware Targets Mexico; Will It Spread?

Data Breach Today

Kaspersky Lab has discovered a new form of malware it calls Dark Tequila that has been targeting users in Mexico and stealing bank credentials and other personal and corporate data. The malware can move laterally through a computer while it's offline, says Dmitry Bestuzhev, a Kasperksy researcher

IT 100

DarkHydrus adds Google Drive support to its RogueRobin Trojan

Security Affairs

When it is opened, embedded VBA macro is trigged to run. “The New_Macro function starts by concatenating several strings to create a PowerShell script that it will write to the file %TEMP%WINDOWSTEMP.ps1.

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. MW : “ Working with IT has been a mixed-bag.

El Chapo's Encryption Defeated by Turning His IT Consultant

Schneier on Security

Impressive police work : In a daring move that placed his life in danger, the I.T. A Dutch article says that it's a BlackBerry system. consultant eventually gave the F.B.I.

GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

The Last Watchdog

Modern cyber threats often are not obvious – in fact it is common for them to lurk inside a business’ systems for a long time without anyone noticing. To achieve this for your organization, it is no longer possible just to run reactive cyber security. It is essential that should invest in a proactive approach – that’s why you need to start threat hunting. based cybersecurity professional; his 15 years IT experience, includes penetration testing and ethical hacking projects.

How To 142

Managing the Risk of IT-OT Convergence


Cloud Security Critical Infrastructure Hacks InfoSec Insider IoT Web Security Industrial Control Systems Information Technology Internet of things IT-OT Convergence NotPetya operational technology WannaCryWhy manufacturing and logistics are especially challenged.

It's Time to Move Endpoint Security to the Cloud

Data Breach Today

It's time to move your antivirus to the cloud Learn how to leverage a predictive security cloud model to get ahead of emerging attacks. Traditional endpoint security products are holding organizations back.

Cloud 130

White House Says It's Been 'Very Tough' on Russia

Data Breach Today

The White House is facing questions over what it's doing to deter Moscow Russia's US Election Interference: Trump Administration Defends Response After a U.S. indictment charged Russians with running a troll factory that interfered in U.S.

IT 165