Apptimate | Insights
3120
page-template,page-template-blog-masonry,page-template-blog-masonry-php,page,page-id-3120,page-child,parent-pageid-3161,dwpb-push-page,dwpb-allow-close,ajax_fade,page_not_loaded,,select-child-theme-ver-1.0.0,select-theme-ver-4.1,wpb-js-composer js-comp-ver-5.1.1,vc_responsive

Insights

The web is just steaming with blogs, company pages, news, etc, about things that interest us.

Since we are all about making things easy we collect interesting news and findings and add our point of view.

Please follow our curated channels on scoop.it:

Security in Internet of Things, Secure CommunicationPrivacy Protection and Mobility for Enterprise.

Cloud Security Evolution (infographic)

See on Scoop.itCommunication Security

A take on the evolution of cloud security, and what HYKER brings.

Hyker Security‘s insight:

Cloud Security and HYKER End-to-End Security, that protects the full data lifecycle from a data producer to data consumers, in an unbroken chain, anywhere, over time, in transfer and at rest.

Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles

See on Scoop.itCommunication Security

Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.

Hyker Security‘s insight:

The cloud is a way to scale and save money, not to protect your data. Not yet anyway. There market is heating up with innovation to protect the data while still maintaining the economical reasons for the cloud.

8 Critical IoT Security Technologies

See on Scoop.itSecurity in Internet of Things

The growth of IoT devices coupled with the rise in cyberattacks means that system security cannot be engineered after the design.

Hyker Security‘s insight:

The rapid growth of IoT devices and the challenges posed by wireless connectivity among these devices necessitates an expanded focus on cybersecurity. The eight key critical IoT security technologies presented here are a combination of traditional and newer methods and tools that work to truly secure the IoT.

The Hunt for IoT: The Rise of Thingbots

See on Scoop.itSecurity in Internet of Things

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs are pointing to them becoming the attacker infrastructure of the future.

Hyker Security‘s insight:

IoT attacks exploded by 280% in the first half of 2017

New Personal Data Legislation And Cybersecurity – Information Security Buzz

See on Scoop.itCommunication Security

Following the news that the government is set to introduce a new Data Protect Bill that will give people the right to have all their personal data deleted by companies, IT security experts commented below. Justin Coker, Vice President EMEA at Skybox Security: “Organisations are in the midst of GDPR compliancy work so the government …

Hyker Security‘s insight:

Protect your data, all the data, and its full lifecycle.

World’s Leading Hackers Explain Why You Don’t Want Huge Tech Companies Controlling Everything in Your House

See on Scoop.itSecurity in Internet of Things

The internet of things is a way to extract wealth from your every day life. Is the Internet of Things the next big productivity leap in modern times? Or is it, as it was commonly referred to at DEFCON 25, the Internet of Sh*t?

Hyker Security‘s insight:

One of the contradictions about the IoT business model is that these networked objects are not profitable. They ultimately cost too much to maintain, and so the companies who make them are of necessity exploring alternate revenue streams. Your data is a ready-made product to fill this void.

UK firms still relying on perimeter defences for cyber security

See on Scoop.itCommunication Security

Despite the increasing number of data breaches and the looming GDPR compliance deadline, many companies are still relying on perimeter defences and are underinvesting in technologies to keep data safe, research has revealed

Hyker Security‘s insight:

“75% of the data stolen from businesses on average was not encrypted”. Perimeter security is so last year.

Cloud computing security: This is where you’ll be spending the money | ZDNet

See on Scoop.itCommunication Security

As cloud computing moves into the mainstream, companies are looking at new ways of securing their data.

Hyker Security‘s insight:

“Using third party tools, rather than relying on the cloud vendors own security, can give companies an additional layer of security. By using an additional layer of encryption, for example, companies can ensure that even if the cloud provider gets hacked their data should remain secure.”

 

FAQ: HYKER vs Signal

See on Scoop.itCommunication Security

HYKER protects the data during the full lifecycle from producer to consumer(s) in an unbroken chain, anywhere, over time, in transfer and at rest.

Signal provides end-to-end encryption with Perfect Forward Secrecy (PFS) only for messages in transfer.

Also, some of the key strengths of PFS, like no central data storage or that data must have an explicit receiver, have some drawbacks that the HYKER approach solves:

Hyker Security‘s insight:

HYKER end-to-end encryption compared to Signal and Perfect Forward Secrecy (PFS).

FBI catches mail bomber in dark web covert operation

See on Scoop.itPrivacy Protection

Clinton Scott Bass, of Georgia, pleaded guilty in April to charges of purchasing explosives on a dark web marketplace to kill or harm a huma

Hyker Security‘s insight:

TOR network or encryption protects from mass surveillance, but some good old police work can still catch the bad guys.

Alasdair Allan – The Little Things of Horror

See on Scoop.itSecurity in Internet of Things

The current age where privacy is no longer regarded as “a social norm” may not long survive the coming of the Internet of Things. To a lot of people the digital Internet still isn’t as real as the outside world. But it’s going to be a different matter altogether when your things tattle on you behind your back.

Hyker Security‘s insight:

The current age where privacy is no longer regarded as “a social norm” may not long survive the coming of the Internet of Things. To a lot of people the digital Internet still isn’t as real as the outside world. But it’s going to be a different matter altogether when your things tattle on you behind your back.

MEPs Ready To Fight For End-To-End Encryption Across EU

See on Scoop.itPrivacy Protection

A European Parliament committee has called for end-to-end encryption to be enforced on all forms of digital communication

Hyker Security‘s insight:

HYKER End-to-End Encryption protects the full lifecycle of the data from the data producer to the data consumer(s), in an unbroken chain, over time, in transfer and at rest. Inaccessible without the right key, wherever it is for the moment.

15% of All IoT Device Owners Don’t Change Default Passwords

See on Scoop.itSecurity in Internet of Things

Simple statistics can tell you a lot about the state of security in a market niche. For example, if we’d said that just five passwords would grant you access to 10% of all the IoT devices available online, you’d be right to feel concerned.

Hyker Security‘s insight:

Suppliers need to take full responsibility over protecting their customers. You cannot trust a user to change default settings without the right knowledge. So, it is instead a design issue, how you help the user do the right configurations. Eliminate the need to understand the complicated technology. Eliminate the risk of user errors.

European Parliament Proposes Ban On Encryption Backdoors

See on Scoop.itPrivacy Protection

European Parliament Recommends Use of End-to-End Encryption and Proposes Ban On Encryption Backdoors.

Hyker Security‘s insight:

“The protection of confidentiality of communications is also an essential condition for the respect of other related fundamental rights and freedoms, such as the protection of freedom of thought, conscience and religion, and freedom of expression and information,” 

5 fundamentals of IoT security

See on Scoop.itSecurity in Internet of Things

For IoT to grow up we need professional approaches towards security and privacy protection. Anything else will just destroy the market for everyone and make you lose customers and credibility.

Hyker Security‘s insight:

Hyker.io on #IoT #Security

Home Router Botnet Resumes Attacks

See on Scoop.itSecurity in Internet of Things

Yesterday at 7pm UTC (noon PDT) we saw the volume of brute force attacks on the WordPress sites that we protect more than double from the average for the previous 24 hours. The number of attacking IPs more than tripled. The chart below shows the count of attacks per hour from June 12th onward. You can …

Hyker Security‘s insight:

Another day in the life of a botnet

Insiders – Still an organization’s biggest silent cybersecurity threat

See on Scoop.itSecure communication

High-profile data breaches continue to cause executives to turn heads, but are they looking in the right direction?

Hyker Security‘s insight:

To limit the impact of both internal or external data breaches you must control access to data. Granular access authentication and end-to-end encryption are recommended tools to protect data. A single user account breach should only potentially expose the data that user has the right to. Not expose all data on a server. 

 

Cybersecurity must shift it’s focus from securing servers and networks, to securing the actual data, wherever it is.

Thousands of enterprise apps exposing data on back-end servers

See on Scoop.itSecure communication

With so much data apparently exposed via back-end servers, we shouldn’t be surprised if there’s a new wave of thefts and extortion attempts

Hyker Security‘s insight:

The focus must be protecting the data, not the device, network or servers. End-to-end encryption is a strong and useful technology to lock down data and provide access only to authorized users, wherever that data might be.