There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million new vehicles with built-in connectivity manufactured by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications of cyber-threats in this domain. Already, real-world attacks and demonstrations by researchers have shown the potential for serious disruption.
That’s why Trend Micro has announced a major new partnership with Panasonic which will tap the expertise of both companies to create a leading cybersecurity solution for connected cars. Continue reading →
CISOs are regularly bombarded with breaking news on advanced nation state espionage campaigns and sophisticated cybercrime heists. From the ongoing machinations of the Kremlin-linked Pawn Storm group to the recently uncovered cyber-bank raid by the MoneyTaker gang, these threats tend to grab all the headlines. But IT security leaders will know that some of their biggest problems come from legacy threats: what we’re calling “Throwhacks”.
Unlike the popular social media trend “Throwback Thursday”, there’s nothing entertaining about this list of legacy security challenges. Organisations need to get a handle on these threats before they start worrying about hackers armed with advanced AI tools.Continue reading →
The past 12 months have been packed with geopolitical incident, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shock revelations just last month, there’s been plenty for UK CISOs to ruminate on. But now the year is nearly at an end, it might be useful to recap some of the biggest themes of 2017 — with an eye on fortifying systems for the 12 months to come. Continue reading →
As the Internet of Things (IoT) permeates further into our everyday lives, the potential for hackers to line their pockets and even disrupt key critical infrastructure moves increasingly from theory to practice. We’ve already seen Ukrainian power stations crippled by malware, connected car vulnerabilities reach crisis point and even smart baby monitors hacked.
Voice assistants are the latest piece of the IoT ecosystem to come under scrutiny. A new Trend Micro infographic highlights the key privacy issues, vulnerabilities and attack scenarios which could affect smart home users. For those IT and business leaders looking for more guidance, check out our CLOUDSEC conference next week. Continue reading →