Purdue University will launch an Innovation Hub as part of its Discovery Park. It will be used to research topics surrounding autonomous vehicles, including cybersecurity, public policy and artificial intelligence.
Hackers have been targeting iPhone users, tricking consumers into downloading open-source mobile device management software that gives the hackers access to users' sensitive information. Experts think the hackers are likely using social engineering to target devices.
Cybersecurity incidents in the first quarter of the year were up 32% from the same period last year, a Positive Technologies report states. The report also states that malware attacks were up 75% from last year, while data theft rose 13%.
Nearly two-thirds of organizations have experienced a threat to employee safety from a breach of supervisory control and data acquisition systems or industrial control systems, according to a Forrester study. Almost 60% of surveyed organizations had a breach during the past 12 months.
Using encryption technologies and an end-to-end cybersecurity strategy is critical for mitigating data breach threats, writes Nick Jovanovic of Thales eSecurity Federal. Although there is no "silver bullet" for breach mitigation, encryption combined with cybersecurity training, updated policies and technologies can bolster the security of sensitive data, Jovanovic writes.
A response team for cybersecurity events makes it possible for companies to respond to issues quickly and efficiently, writes French Caldwell of MetricStream. These teams are trained, have expertise and, through practice runs, can identify vulnerabilities before they are exploited, he writes.