In light of the 52nd Munich Security Conference this weekend, lets recap some of the key issues that policy makers and business leaders need to address in 2016 and upcoming years:
2016 marks a record-breaking year for M&A activities. Unfortunately, it’s also another year of a large number of data breaches and hacks becoming front-page news. CxOs, law firms, dealmakers and investors involved in M&A generally ignore Cyber risks that have implication on deal execution, deal value, reputation; post-M&A liabilities, operations and bottom-line; or acquirer vulnerability. This is partly based on awareness, lack of knowledge or misconceptions about Cyber risks and assessments.
Nearly every application software brings a number of certificates with it. If you ask long-term IT security experts, they typically estimate that between 30 to 3,000 certificates are installed on any given PC. In reality a standard Windows 8.1 system easily has 30,000 and more certificates. MacOS 10.6 contains 2,000 certificates. Even on a Linux system (e.g. UBUNTU 14) there are 800 certificates. Unfortunately, lots of these certificates are outdated, are provided by untrustworthy issuers or use weak cryptography. Some certificates were generated a decade…
One can look at the Internet of Things in a way where sensors are embedded in the physical world, e.g. plant sites, offices, homes or humans. Sensors embedded in the physical world of humans are also known as wearables. Wearables such as fitness trackers and the like are an important component of the Quantified Self . But wearables are more; they also include items like smart watches and smart eyewear. Gartner expects a strong growth in the wearable market in 2015, rising 38% from 2014.
Many industrial companies have a general rule like: all information that one can obtain during work or for work is confidential or highly confidential unless that information has been published by the communication department to the outside world. It should be every employee’s concern to protect the company’s confidential and sensitive information, this includes technology, know-how, strategy and intellectual property.