But while some short-term fixes may develop, forthcoming government auto cybersecurity standards won’t happen until at least 2018. Furthermore, technologies, such as message encryption and authentication, which can be used to secure and verify the legitimacy of communications occurring along in-vehicle networks—cannot be incorporated into existing vehicles. Rather, such technologies must be incorporated during the vehicle design and production process, which according to experts, will take approximately 5 years to complete,
Quelle: Headaches likely to grow over auto cybersecurity concerns
You have to standardize on a set of descriptive tags to identify the assignment of resources to cost centers
Quelle: How to get cloud cost reporting under control
When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.
Quelle: You’ve been hit with ransomware. Now what?
A previously unknown cybercrime group has hacked into numerous organizations in the retail and hospitality sectors to steal an estimated 20 million payment cards,
Quelle: Cybercrime Gang Tied to 20 Million Stolen Cards
The online heist of $81 million from Bangladesh Bank involved custom malware that hacked the database used by the bank’s SWIFT software, allowing attackers to
Quelle: Bangladesh Bank Attackers Hacked SWIFT Software
While no one thinks security problems will go away, companies are willing to tolerate the risk in the name of agility, flexibility and lower costs.
Quelle: Companies high on virtualization despite fears of security breaches