Cyberattacks

The Rise and Rise of Ransomware

An Irresistible Business Model Once thought to be on the decline, successful ransomware attacks against all types of companies and organisations have dotted the headlines in the last two years. In 2019, the FBI’s Internet Crime Complaint Center (IC3) received more than 2000 ransomware complaints, accounting for US$8.9 million in losses. We expect these numbers

The Rise and Rise of Ransomware Read More »

Connected Medical Device Security: A Deep Dive into Healthcare Networks

Healthcare delivery organizations (HDOs), such as hospitals and clinics, are complex organizations where a broad range of Information Technology (IT), Internet of medical things (IoMT), Operational Technology (OT) and Internet of Things (IoT) devices are increasingly interconnected. The growing number and diversity of devices in HDOs have introduced new cybersecurity risks. The ability to compromise

Connected Medical Device Security: A Deep Dive into Healthcare Networks Read More »

Nokia Threat Intelligence Report

Introduction – Nokia Threat Intelligence Report This report provides a view of malware activity in mobile and fixed networks around the world. The data in this report has been aggregated from service provider networks where Nokia’s NetGuard Endpoint Security solution is deployed. This network-based malware detection solution enables Nokia customers to monitor their fixed and

Nokia Threat Intelligence Report Read More »

State of Cybersecurity 2020

More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching business concern. From formal policies

State of Cybersecurity 2020 Read More »

State of Cybersecurity 2020

State of Cybersecurity 2020 – More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching

State of Cybersecurity 2020 Read More »

Curve of Convenience 2020 Report: The Privacy-Convenience Paradox

INTRODUCTION As Asia Pacific edges towards becoming a digital-first economy, organizations across the region are realizing that applications are fast becoming their most business valuable asset. Yet, at a time when both the private and public sectors are redefining what a good user experience means in today’s world, consumer trust continues to wane as cyberattacks

Curve of Convenience 2020 Report: The Privacy-Convenience Paradox Read More »

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection

Introduction The goal of this National Institute of Standards and Technology (NIST) Interagency Report (NISTIR) is to show practical approaches that manufacturers can use to strengthen cybersecurity in their manufacturing processes. Behavioral anomaly detection (BAD) tools can provide a key security component for sustaining business operations, particularly those based on industrial control systems (ICS). Because

Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection Read More »