The British government continues to delay deciding whether it will ban Chinese networking gear from its national 5G rollout, as the Trump administration demands. But with future trade deals on the line as the U.K. navigates its "Brexit" from the EU, Britain cannot afford to anger either Beijing or Washington.
Human error looks to be the obvious culprit in an accidental data breach by Britain's Cabinet Office, which published the home addresses of celebrities such as Elton John and Olivia Newton-John when it released a list of individuals set to be recognized for their contributions to British society.
Wanted: A new chief executive to assume command of Britain's growing National Cyber Security Center, part of GCHQ. As Ciaran Martin departs, the successful NCSC model he helped create is being widely emulated in many countries. But the U.S. remains a notable holdout.
For two years, an attack group using Ukraine-based infrastructure has been creating hundreds of lookalike domains to target customers of 14 different Canadian banks via phishing attacks, security researchers at Check Point warn.
The gang behind Maze ransomware now lists 21 alleged victims on its website that it says have not paid a demanded ransom, including the Florida city of Pensacola. But Canadian construction firm Bird, which was listed as a victim, subsequently disappeared from the list.
11 Best Practices to Minimize Risk and Protect Your Data
By now, we are all too aware of the consequences of a data breach:
Loss of customer confidence
Potentially costly litigation
However, most organizations are not as familiar with how to prevent these attacks. They still spend...
Singapore's recent order requiring Facebook to label a blog critical of the ruling government as "false" has drawn harsh criticism. And the action calls into question how the country's new Protection from Online Falsehoods and Manipulation Act might be used to suppress free speech.
South Korean cryptocurrency exchange Upbit says hackers have stolen $49 million worth of ethereum, in what is the year's seventh major cryptocurrency heist. Much of the $158 million stolen so far this year is likely fueling the North Korean regime's appetite for luxury goods and weapons of mass destruction.
The Australian government's digital health records program manages risk and privacy relatively well, according to a new audit, but there's room for improvement in third-party risk management and emergency access to sensitive health records.
Watch this live Q&A with Brian Hay, former detective superintendent from the Queensland Police Service and now executive director of Cultural Cyber Security, as he helps organizations understand and develop their business strategies to ensure the highest levels of security.
Despite the numbing buzz around artificial intelligence (AI) and machine learning (ML), it's more than abstract ideas and hypothetical applications. AI and ML are already powering tools that can give your business decision-making processes a massive upgrade. The technology is here, it's already proving itself in the...
IT monitoring technology is moving forward rapidly, thanks in large part to machine learning and predictive analytics. If you're still getting by with a legacy IT solution, you're missing out on a lot more than a shiny object. The benefits of a New IT approach are being proven every day.
Download your complimentary...
From protecting customer experience to preserving lines of revenue, IT operations teams are faced with increasingly complex responsibilities while being required to prevent outages that could harm the organization. Splunk IT Service Intelligence (ITSI) utilizes AI powered by machine learning to deliver a predictive IT...
In 2020, security information event management (SIEM) solutions will be far more than an information platform, expanding to include compliance reporting and logs from firewalls and other devices, as well as User and Entity Behavior Analytics (UEBA) - now considered an essential capability by Gartner. On top of that,...
Your machine data has a record of all of the activity that takes place across your infrastructure. It's become the single most valuable asset in the enterprise, as the secrets to business optimization lie within the scores of microtransactions, including the ability to detect, investigate and respond to threats. And...