Purdue plans center for autonomous vehicles, cybersecurity | Hackers target iPhone users with MDM software | Report: Cybersecurity incidents up 32% in 2018
July 19, 2018
Data Security & Privacy SmartBrief
SIGN UP ⋅   FORWARD ⋅   ARCHIVE
Top Story
Purdue plans center for autonomous vehicles, cybersecurity
Purdue plans center for autonomous vehicles, cybersecurity
(Pixabay)
Purdue University will launch an Innovation Hub as part of its Discovery Park. It will be used to research topics surrounding autonomous vehicles, including cybersecurity, public policy and artificial intelligence.
Daily Herald (Arlington Heights, Ill.) (7/13) 
LinkedIn Twitter Facebook Google+ Email
 
Data Security & Privacy
Hackers target iPhone users with MDM software
Hackers have been targeting iPhone users, tricking consumers into downloading open-source mobile device management software that gives the hackers access to users' sensitive information. Experts think the hackers are likely using social engineering to target devices.
ZDNet (7/16) 
LinkedIn Twitter Facebook Google+ Email
Cyber Risk
Report: Cybersecurity incidents up 32% in 2018
Report: Cybersecurity incidents up 32% in 2018
(Pixabay)
Cybersecurity incidents in the first quarter of the year were up 32% from the same period last year, a Positive Technologies report states. The report also states that malware attacks were up 75% from last year, while data theft rose 13%.
TechRepublic (7/17) 
LinkedIn Twitter Facebook Google+ Email
 
By the Numbers
Report: SCADA/ICS breaches place employees in harm's way
Nearly two-thirds of organizations have experienced a threat to employee safety from a breach of supervisory control and data acquisition systems or industrial control systems, according to a Forrester study. Almost 60% of surveyed organizations had a breach during the past 12 months.
Dark Reading (7/17) 
LinkedIn Twitter Facebook Google+ Email
Practice & Policy
Encryption the key to bolstering the security of sensitive data
Encryption the key to bolstering the security of sensitive data
(Pixabay)
Using encryption technologies and an end-to-end cybersecurity strategy is critical for mitigating data breach threats, writes Nick Jovanovic of Thales eSecurity Federal. Although there is no "silver bullet" for breach mitigation, encryption combined with cybersecurity training, updated policies and technologies can bolster the security of sensitive data, Jovanovic writes.
Government Computer News (7/13) 
LinkedIn Twitter Facebook Google+ Email
 
How and why to develop a cybersecurity incident-response team
A response team for cybersecurity events makes it possible for companies to respond to issues quickly and efficiently, writes French Caldwell of MetricStream. These teams are trained, have expertise and, through practice runs, can identify vulnerabilities before they are exploited, he writes.
ITProPortal (UK) (7/17) 
LinkedIn Twitter Facebook Google+ Email
Learn more about AllClear ID:
About AllClear ID | AllClear ID Breach Response
AllClear ID Resources
Sign Up
SmartBrief offers 200+ newsletters
Subscriber Tools:
Contact Us:
Editor  -  Brian Hammond
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2018 SmartBrief, Inc.®
Privacy Policy (updated May 25, 2018) |  Legal Information