No one has a road map for securing a connected city – but there should be a whole atlas of such maps. Here at CES, Toyota just announced plans to build a 175 acre (70 hectare) playground in Japan to test connected cities, complete with cars, buildings and real residents willing to be something of ongoing … More CES – Taking a smart city for a test drive
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk. Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving … More Defending your company from cyberattack
WeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career. [Editor] How did you come to be involved with Critical Infrastructure? [David Harley] I first took an interest in Critical Infrastructure (CI) when I started working on the security side … More Critical Infrastructure Interview with cyber-expert David Harley
It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have … More Are mobile devices insecure by nature?
The costs associated with cybersecurity often deter small and medium-sized businesses (SMBs) in the Asia Pacific (APAC) region from making serious considerations about security solutions, owing to limited budgets and lack of expertise, a survey by ESET has found. As the Asia Pacific region continues to grow, and adoption of digital technologies – by consumers and businesses – continues, … More Cybersecurity in Asia Pacific
These days it seems that for every work device you use, you have a personal alternative. But this means having twice as many gadgets – two smartphones, two tablets or even two notebooks – and even more security concerns. To make things even more difficult, for many of these gadgets you ideally need to have … More How to handle multiple devices and passwords at once
A new report from Pulse Secure shows that 97% of mobile malware is targeted at the Android OS. Why does Android remain so dominant? What can you and your company do to reduce the risk of infection? The report also shows that the overwhelming majority of Android malware is being developed and distributed by … More Android malware radically dominant