Nov 09, 2017
What does IoT really mean for the enterprise?
For most people, the Internet of Things (IoT) conjures up images of self-driving cars, smart refrigerators and fitness monitors. But in reality, some of the biggest IoT use cases are happening in B2B. Companies are leveraging the technology to improve the efficiency of their day-to-day processes and operations.
Nov 08, 2017
Smart traffic helps improve quality of life
As cities work to better manage traffic and flows of people through their strained infrastructure, implementing intelligent traffic systems can help them better understand current needs and make adjustments.
Oct 31, 2017
Smart cities are the wave of the future
Imagine you’re approaching an intersection on foot and without you doing anything, the traffic light senses your smartphone beacon and your pedestrian profile. The light changes as you reach the curb, allowing just the 12 seconds it takes you to cross before turning to red.
Oct 31, 2017
Data breaches in industrial environments: Safety comes first
If you’ve read the 2017 Data Breach Digest, you’ll be familiar with a breach scenario known as “The Fiddling Nero”. This involved a manufacturer who engaged the Verizon Incident Response (IR) team to conduct a due-diligence health check, and found the operational technology (OT) systems were replete with malware infections.
Oct 30, 2017
Acceptable use policies: Keeping your workplace secure
Acceptable Use Policies (AUPs) may not top the list of the most exciting information security topics, but AUPs play an important role in educating employees about what type of behaviour is permitted when using company assets. Employees or users operating outside of the rules can increase the likelihood of:
Oct 27, 2017
Social engineering: Strengthening the weakest link
Social engineering is the act of deception, manipulation, or intimidation of a person in order to gain access to information assets. In our 2017 Data Breach Investigations Report (DBIR), we found that social engineering played a key role in 43% of confirmed cybersecurity incidents involving data disclosure.
Oct 24, 2017
Powering the digital economy with modern utilities
The Internet of Things (IoT) is changing everything we used to know about best business practices, and is opening up new avenues for innovation. Utilities are in a unique position in this era of transformation.
Oct 23, 2017
Insider Threat: One pattern, four scenarios, thirteen countermeasures
As many of you know, we released our sophomore publication of the Data Breach Digest in February 2017. Building on the success of the 2016 report, we wanted to go beyond the investigator perspective on data breaches—so, for the 2017 Data Breach Digest, we provided a stakeholder perspective.
Oct 19, 2017
Make sure the bad guys don’t get what they’re hoping for this Christmas
It’s approaching that time of year again. Summer is over and the festive season is just around the corner. This period is crucial to many retail and hospitality businesses, and they are crossing their fingers that 2017 will be a bumper year.
Oct 17, 2017
Darknet: The shady underbelly of the iceberg
Think of the internet as a large iceberg. The tip of the iceberg, which most people can see, is the internet. They can access it using normal channels such as search engines, social media and news websites.
Oct 12, 2017
Delivering smart, sustainable energy solutions
There’s no question that the Internet of Things (IoT) will transform the energy and utilities industry—that’s already happening. IoT is playing a central role in the modernization of the energy sector—perhaps more than in any other industry.
Oct 09, 2017
Staying safe online: Observing good digital hygiene
Online safety is more important than ever. Almost half of the world's population are using the internet. And they’re not just using it to access general information, but also to conduct their sensitive business online—including financial, health, personal and business transactions.
Feb 08, 2017
Data Breach Digest: Perspective is reality
Our 16 new cybercrime case studies provide insight into the biggest threats you face—plus tips on how to prevent them.
Feb 02, 2017
Data Breach Digest IoT Calamity: the Panda Monium
Read about one of the 2017 Data Breach Digest characters, Panda Monium. This scenario looks at what happened when one university was attacked by an Internet of Things (IoT) botnet barrage of 5,000 hosts.
Jan 23, 2017
Harvard Business Review - Big Data
Can you handle the volume, variety and velocity of IoT data?
Oct 28, 2016
Data Breach Digest Update - Data ransomware: User and file space error
Scenario #15 of the cybercrime case studies detailed how employees at one small company had access to their files held to ransom. Discover how you can avoid finding yourself in a Catch 22 situation.
Oct 26, 2016
Hybrid IT takes center stage
Oct 06, 2016
Giving up control article
Oct 05, 2016
Data Breach Digest Update - Hacktivist attack: Shedding light on the matter
Data Breach Digest scenario #8 focused on a critical infrastructure breach by a hacktivist. But it’s not just high-profile organizations that are at risk. Get our top tips for mitigating and responding to hacktivist attacks.
Sep 09, 2016
Data Breach Digest Update - CMS security: Keeping the pirates at bay
One of the cybercrime case studies in the Data Breach Digest involved pirates hacking into a global shipping company’s content management system to access data that aided their plunder. Learn how to protect yourself.
Sep 09, 2016
Verizon Intelligent Lighting Solutions