CILIP and Nielsen Book announce major new partnership


CILIP, the library and information association, is proud to announce a new two-year partnership with Nielsen Book that includes sponsorship of CILIP?s s Building a Nation of Readers campaign and National Libraries Week. s commitment to supporting libraries, librarianship and the book trade. I am delighted to be working with Nielsen Book on these two vital campaigns, Building a Nation of Readers and Libraries Week. Libraries Week is a weeklong celebration of the nation?s

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

For the second month in a row, ransomware has dominated our list of data breaches and cyber attacks. Of the 128 publicly disclosed incidents that we discovered in May, more than 40% of them were ransomware attacks.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality.

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

We recorded 103 cyber security incidents in November, which accounted for 586,771,602 leaked records. The majority of those came from a credential-stuffing attack targeting Spotify and a data leak at the messaging app GO SMS Pro, which you can learn more about below.

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

The economic sectors represented by ten or more survey respondents include the following: agriculture; construction; manufacturing; retail trade; transportation and warehousing; information; real estate rental and leasing; professional, scientific, and technical services; management services; waste management; educational services; and arts and entertainment.

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Most device or software manufacturers place backdoors in their products intentionally and for a good reason. Since 2008, RAM scraping has been a boon for retailers. This rootkit can alter security settings, allowing the attacker to replace executables and system libraries and modify interface behavior. Malware, short for “malicious software,” is any unwanted software on your computer that, more often than not, is designed to inflict damage.

The Hacker Mind: Hacking IoT


The Department of Justice, have submitted letters to the Library of Congress who manages those exemptions. Vamosi: For example, let's say you're a large retail organization with a number of physical locations.

IoT 52