Gartner predict that worldwide spending on IoT security will reach $1.5 billion in 2018. Comparing with 2017 IoT security spending will increase by 28% (from $1.2 billion). Gartner says by 2021, such concerns will push IoT security spending to over $3.1 billion. Worldwide IoT Security Spending Forecast (Millions of Dollars) 2016 2017 2018 2019 2020 2021 Endpoint Security 240 302 373 459 541 631 Gateway Security 102 138 186 251 327 415 Professional Services 570 734 946 1,221 1,589 2,071 Total 912 1,174 1,506 1,931 2,457 3,118 Source: Gartner (March 2018) https://www.gartner.com/newsroom/id/3869181
Cydome Security joins the Be Cyber At Sea initiative. The initiative is a global maritime and offshore industry initiative for increasing maritime threat awareness. Our company is dedicated to the Maritime Cybersecurity – and as such, we also believe that along with the right tools to detect, protect, response and mitigate – the human factor is critical. The Maritime personal should be well trained and understand the threats and how to minimize exposure. “A global maritime and offshore industry initiative to raise awareness of the increasing maritime cyber threats to international shipping, ports and offshore operations. More than 90% of world trade including the global transportation of energy is […]
ThyssenKrupp reveal a sensitive cyber attack on 2017. The target was a shipyard were the group will manufacture military ships and submarines for Israel. The leak exposes technical details about the submarines that were being built. Erel Margalit, CEO of JVP, said that the Lebanese part of ThyssenKrupp group could deliver confidential information to some Iranian groups. For more information click here.
The container transportation company Maersk was hit by NotPetya ransomware this July. The attack impacted Maersk Line, APM Terminals and Damco. Consequently, one of their subsidiaries remain offline business for two days. The CEO announced that the company could lose 300 million in revenues. However, they said that third party data was not compromised. Between the actions taken, they patched all the systems and implemented further protections over the networks. More info, click here.
The consulting company IOActive publish a series of vulnerabilities found in AmosConnect 8 platform from Inmarsat. The software is used for monitor GPS and Technology systems on board, as well as providing messaging, email and web browsing services. One of the bugs was found in the login form, allowing the attacker to easily obtain the username and password from the product database. The other flaw allows the attacker to gain privileged access remotely. The latter could allow execute commands that can compromise personal and operational data, but could put in danger the navigation and general IT system. The systems are evolving and this example show how important is for maritime […]
The hackers stole National Security Agency procedures used to spy foreign networks and the methods adopted to protect the networks of U.S.. Besides, the group took the code associated to the previous tasks. The breach took place in the home computer of a NSA contractor. The hacker used a Kaspersky Lab antivirus to access the target system. There is no sufficient evidence to support the Russian company collaboration in the case. More Information click here.
A misconfigured cloud-based file repository exposed the names, addresses, account details, and PINs of as many as 6 million US customers of telecommunications carrier Verizon. The cloud server was owned and operated by telephonic software and data firm NICE Systems, a third-party vendor for Verizon. More information click here
Equifax suffered the major data leak in its history. The event involved 143 million of customers and compromised Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. The leak took place on July 29th. The company set a web, www.equifaxsecurity2017.com , where you can check if your data have been stolen. The breach affected US citizens mainly, but there are people from UK and Canada also involved.
Uncertainty over Brexit is high and its full implications are still unknown, especially since no date has been set for the U.K. to exit the EU. But many are concerned about the impact Brexit could have on data privacy and U.K. cybersecurity. Data Privacy Regulations In terms of data protection, the U.K. will still be a part of the EU when the general data protection regulation becomes law in May 2018. All EU member states must comply, and the U.K. is no exception. Even before the referendum, the U.K.’s information commissioner’s office issued a statement reiterating the importance of data protection. It’s likely that, post-Brexit, the U.K. will update its […]
A new report released by Research and Markets, forecasts IT Outsourcing (ITO) market growth, for Asia and Pacific market (APAC) while showing a real concern regarding data security and privacy. IT Outsourcing is growing In the report, industry expert say that ITO market in APAC will grow 5.80% by 2020. A key factors for this growth is the cloud computing: while enterprises already use the cloud infrastructure, SME can now also enjoy cloud services. This Key vendors in this reports are Accenture, Fujitsu, HP, IBM and TCS. DATA Security Concern Report states that data security and privacy concerns will be a challenge for the market. Data security and privacy concerns always remain significant challenges in any organization. Companies face pressure […]