Back in 2011, security researcher Jay Radcliffe hacked into his own insulin pump, demonstrating how a remote user could potentially deliver a fatal dose of insulin to an unsuspecting diabetic. It was a dramatic way to show the medical device industry how insecurity of devices could lead to life-threatening situations.
U.S. shoppers are likely to change their shopping habits if their favorite retailer experienced a data breach, according to a report by Vormetric and Wakefield, which specialize in data security solutions.
Criminals go where they can do the most damage with minimal effort. It's why, for years, hackers targeted Windows rather than Macs - it was where the users, and in turn the data, were. And now we're seeing a steady migration from one platform to the next as popularity grows. Hackers moved from Windows to Apple's OS to mobile. Now, unsurprisingly, they are targeting the cloud.
With cyber risks looming ever larger, CFOs must avoid "starving" information technology security budgets, the author of a recently released survey concerning cybersecurity and corporate governance warns.
Organizations must make improvements to their risk management programs in order to keep pace with the latest cyber-attack risks and data security challenges, according to the second annual 2015 Vendor Risk Management Benchmark Study, released by the Shared Assessments Program and Protiviti, a global consulting firm.