Latest Headlines

Latest Headlines

Regulations, cybersecurity main hurdles left for autonomous vehicles

Connected cars and autonomous vehicles are coming; it's just a matter of when and how. The technology is essentially viable, and now it's up to U.S. lawmakers, government agency officials and industry executives to come to an agreement on making these rolling mobile devices street legal.

Cybersecurity is the top IT investment priority for Western European utilities

Chief information officers at utilities in Western Europe identified cybersecurity as their top IT spending priority this year, according to a survey by market research firm IDC.

Infographic: Top 4 cybersecurity trends

IBM Security has identified the four top trends in cybersecurity: Onion-layered security incidents, rise of ransomware, malicious insider attacks and greater management awareness of cyberthreats.

Three-quarters of IT and security pros say a breach caused by an IoT device is likely

Close to three-quarters of 7,016 IT and cybersecurity professionals that nonprofit IT association ISACA surveyed rated the likelihood of their organization being hacked through an Internet of Things device as medium or high.

Are the Keystone Cops running the nuclear power industry?

According to a study by think tank Chatham House, top industry executives as well as nuclear plant personnel lack an understanding of cybersecurity risks and basic cybersecurity best practices. And communication between operational plant personnel and cybersecurity personnel is often difficult.

Infographic: Costly data breaches force boards to focus on IT security

In response to the costly data breaches over the last few years, boards of directors at companies are now taking notice of information security, according to a survey by Georgia Tech University.

High-tech giants take heat from privacy groups over CISA support

High-tech giants Apple, IBM, Microsoft and others firms who are members of the BSA | The Software Alliance are getting hammered by privacy groups over their support of the controversial Cybersecurity Information Sharing Act bill.

Intel sets up automotive security review board

In the aftermath of the highly publicized hack of a Jeep Cherokee by security researchers, Intel has launched an automotive security review board that will focus on research to improve connected car security.

Hackers in chains: Class of 2015

Last year, we had a roundup of the longest prison sentences for hackers. This year we decided to document the newest jailbirds while calling attention to the hackers who got their sentences reduced or cut altogether. Here's the latest class of hackers in chains. 

5 building blocks for cybersecurity

The five most common building blocks for cybersecurity used by large enterprises and government agencies are data integrity, continuous monitoring, effective communication with the board, risk-based prioritization and closed loop remediation, according to security risk management firm Agiliance.