Connected cars and autonomous vehicles are coming; it's just a matter of when and how. The technology is essentially viable, and now it's up to U.S. lawmakers, government agency officials and industry executives to come to an agreement on making these rolling mobile devices street legal.
Chief information officers at utilities in Western Europe identified cybersecurity as their top IT spending priority this year, according to a survey by market research firm IDC.
IBM Security has identified the four top trends in cybersecurity: Onion-layered security incidents, rise of ransomware, malicious insider attacks and greater management awareness of cyberthreats.
Close to three-quarters of 7,016 IT and cybersecurity professionals that nonprofit IT association ISACA surveyed rated the likelihood of their organization being hacked through an Internet of Things device as medium or high.
According to a study by think tank Chatham House, top industry executives as well as nuclear plant personnel lack an understanding of cybersecurity risks and basic cybersecurity best practices. And communication between operational plant personnel and cybersecurity personnel is often difficult.
In response to the costly data breaches over the last few years, boards of directors at companies are now taking notice of information security, according to a survey by Georgia Tech University.
High-tech giants Apple, IBM, Microsoft and others firms who are members of the BSA | The Software Alliance are getting hammered by privacy groups over their support of the controversial Cybersecurity Information Sharing Act bill.
In the aftermath of the highly publicized hack of a Jeep Cherokee by security researchers, Intel has launched an automotive security review board that will focus on research to improve connected car security.
Last year, we had a roundup of the longest prison sentences for hackers. This year we decided to document the newest jailbirds while calling attention to the hackers who got their sentences reduced or cut altogether. Here's the latest class of hackers in chains.
The five most common building blocks for cybersecurity used by large enterprises and government agencies are data integrity, continuous monitoring, effective communication with the board, risk-based prioritization and closed loop remediation, according to security risk management firm Agiliance.