BY Capgemini
This page was produced by FT2, the advertising department of the Financial Times. The news and editorial staff of the Financial Times had no role in its preparation.

Capgemini IT: GROWTH ACCELERATOR

IT trends spotted and checked by experts

TREND LIBRARY

Cybersecurity: How can we fight against new threats?

Data theft, cyber-extortion, denial of service attacks - the list is long. The number of cyber threats has multiplied in recent years, reaching an ever greater level of sophistication. Sony, eBay, Home Depot, JP Morgan and Target have all been victims, and these are just the cases that have received media coverage. Companies are at even greater risk given the spread of mobile devices, connected objects and cloud-based platforms, all of which have introduced new exploitable flaws. Fighting against cyber-crime must be a constant preoccupation.
Protecting Europe's GPS satellite from hackers
20 Feb, 2017 09:00 am
Protecting Europe's GPS satellite from hackers

Researchers from the Department of Electrical Engineering at the University of Leuven in Belgium have developed a way of preventing distortions of positioning signals emitted by Galileo...

Your heartbeat, your password
31 Jan, 2017 09:00 am
Your heartbeat, your password

Researchers have developed a way to use the human heartbeat to replace computer passwords, the latest manifestation of biometrics being used...

Police darknet raid puts dent in illegal trade
9 Nov, 2016 09:00 am
Police darknet raid puts dent in illegal trade

International law enforcement agencies launched a large-scale crackdown on criminals using Tor identity-hiding software to trade illegal goods on the "darknet".

When your toaster turns against you
2 Nov, 2016 09:00 am
When your toaster turns against you

Internet-connected household appliances were used as a backdoor for the launch of cyber denial-of-service (DDoS) attacks against Internet service...

How to align security imperatives with business needs
30 Sep, 2016 09:00 am
How to align security imperatives with business needs

Security departments are very good at outlining the best technology solutions for their companies but are less successful when it comes to aligning...

Scientists make a leap towards quantum communications
27 Sep, 2016 10:04 am
Scientists make a leap towards quantum communications

Scientists have successfully transported a quantum bit for 60 miles over fibre cable, shattering the previous record.

Yahoo hack likely the biggest attack in history
26 Sep, 2016 10:52 am
Yahoo hack likely the biggest attack in history

The vast scale of the 2014 Yahoo hack revealed last week will likely enter the record books once officially confirmed by Yahoo.

Staying ahead of data thieves is becoming increasingly expensive
19 Sep, 2016 09:55 am
Staying ahead of data thieves is becoming increasingly expensive

Enterprise spending on security software has increased rapidly amid more sophisticated and widespread attacks. Even to maintain a minimum level...

Data collectors expose extent of past data breaches
12 Sep, 2016 12:08 pm
Data collectors expose extent of past data breaches

Major data breaches often make headlines, but are often forgotten about when they become yesterday's news. As a way to allow security experts to analyse past data leaks,...

Three tips to beat 'ransomware'
7 Sep, 2016 10:14 am
Three tips to beat 'ransomware'

Data thieves are increasingly holding information for ransom. According to the U.S. Federal Bureau of Investigation (FBI),...

Samsung admits mobile payment security flaw
31 Aug, 2016 09:00 am
Samsung admits mobile payment security flaw

Samsung denied the existence of a Samsung Pay security vulnerability revealed during the recently held Black Hat security conference, but later acknowledged that its payment system...

Anatomy of a social media attack
29 Aug, 2016 11:46 am
Anatomy of a social media attack

Social media attacks involve some tactics that are different than traditional network intrusion attempts.

Twitter crackdown sees 235,000 accounts suspended
24 Aug, 2016 02:51 pm
Twitter crackdown sees 235,000 accounts suspended

Twitter announced that it has suspended 235,000 accounts of users who allegedly used the social networking platform to promote terrorism.

Could this novel technology better protect enterprise networks?
23 Aug, 2016 12:00 pm
Could this novel technology better protect enterprise networks?

A number of security service providers are offering solutions that teach networks how to protect data and communications themselves without human intervention.

World faces cybersecurity skills shortage
29 Jul, 2016 11:48 am
World faces cybersecurity skills shortage

Organisations around the world face a talent shortage when seeking to security workers with cyber security skills, according to a worldwide survey.

Beyond data: why CISOs must pay attention to physical security
26 Jul, 2016 05:17 pm
Beyond data: why CISOs must pay attention to physical security

Best security practices that can protect data from over-the-Internet attacks are of little use when the physical network is threatened, especially from the inside.

Can Security-as-a-Service Fight Constantly Evolving Threats?
26 Jul, 2016 05:16 pm
Can Security-as-a-Service Fight Constantly Evolving Threats?

As we stand in 2016, information technology security is still a problem. It's a big problem in fact. Could an emerging 'as-a-service' based approach to security be part of the solution...

Open-source forum hack puts users at risk
20 Jul, 2016 10:42 am
Open-source forum hack puts users at risk

Ubuntu, an open source operating system from Linux Debian, has fallen victim to a large-scale piracy attack. While names and addresses have been stolen,...

Pokémon Go was never able to read your email
19 Jul, 2016 08:01 am
Pokémon Go was never able to read your email

Security firm Red Owl Analytics has backtracked from its claims that the widely successful Pokémon Go had full access to users' Gmail, Calendar, and other Google apps.

Hacker group behind DNC breach, claims security firm
13 Jul, 2016 08:01 am
Hacker group behind DNC breach, claims security firm

Doubts about the reported origins of a US Democratic National Committee data breach reflect the inherent difficulty in tracing sophisticated network attacks to their sources.

US authorities consider social media scanning for visitors
6 Jul, 2016 10:35 am
US authorities consider social media scanning for visitors

The US Department of Homeland Security has tabled proposals that could see federal powers introduced to scan all visitors' social media accounts.

Snowden dismisses new Russian spy laws as 'unworkable'
4 Jul, 2016 12:03 pm
Snowden dismisses new Russian spy laws as 'unworkable'

A new set of online surveillance measures has been approved by the State Duma, Russia's lower house of parliament. Whistleblower Edward Snowden has called the new laws "an unworkable...

Trend Micro VP: IoT connection points are under attack
27 Jun, 2016 04:01 pm
Trend Micro VP: IoT connection points are under attack

The internal software connectors known as Application Programming Interfaces (APIs) are the new attack threat on the Internet of Things (IoT) device landscape.

Biometric identification must rise to protect us
20 Jun, 2016 04:18 pm
Biometric identification must rise to protect us

The current 'weaknesses' in one, two and even three-factor authentication techniques are not enough to keep us safe.

Bitcoin wallet security starts to add up
23 May, 2016 02:28 pm
Bitcoin wallet security starts to add up

As the interest and adoption of virtual currencies now reaches a new level of tangible implementation, there is new discussion and analysis relating to users' obvious concerns relating...

Smart cities harbour 'dumb' malicious hacking risks
2 May, 2016 04:08 pm
Smart cities harbour 'dumb' malicious hacking risks

The root of the security problem with smart cities lies in the fact that industrial sensors very typically collect 'raw' data and then merely pass it on -- this native unprocessed information...

Encryption backdoors prone to criminal abuse
21 Apr, 2016 12:28 pm
Encryption backdoors prone to criminal abuse

Cambridge University's Ross Anderson has said that despite the technology advancements that have led to the development of encryption backdoors, as a means of restricted access they...

When malware starts to attack malware
19 Apr, 2016 11:46 am
When malware starts to attack malware

Thanatos is a new strain of malware tooling that has the ability to scan a network for other malicious code and then kill off competing viruses, hacks and Trojans before unleashing...

SUBSCRIBE TO THE NEWSLETTER
Nigel Lewis, Meet Nigel Lewis, expert in Business Analytics.
Nigel Guy, Meet Nigel Guy your SI Delivery Excellence, BI & Analytics expert..
John Parkinson, Meet John Parkinson, your Data Governance, Data Quality, Data Strategy, Data Management expert.
Subhinder Dhillon, Meet Subhinder Dhillon, your Financial services, Banking and Insurance expert.
{POPUP_CONTENT}