Securing PLCs

 The Stuxnet worm is known as one of the worst cyber-attacks in industrial history. Any computer connected to the internet is always at risk of attack, whether personal or industrial. In this article Jonathan Wilkins, marketing director of obsolete parts supplier EU Automation, explains how manufacturers can use programmable logic controllers (PLCs) in industry and […]

Tomorrow: How machine learning can help with GDPR and CCPA compliancy

Live tomorrow at 3pm, Data Protection World Forum in partnership with data compliance software specialists, BigID, present “PI Discover and Privacy Automation for GDPR and CCPA” webinar. This exclusive broadcast sees BigID’s Chief Privacy Officer, Nimrod Vax, and the Bank of England’s GDPR Advisor, Steve Wright discuss the unique data discovery challenges posed by the […]

Why maintaining cyber security is essential for your business

Technology over the past few decades has become an increasingly integral aspect of the workplace. From email correspondence and financial transactions, to professional networking and collaborative work documents, businesses rely on technology to be connected at all times and conduct work effectively. However, when these lines of communication are threatened or even compromised, it can […]

AI: The war of the algorithms

Thanks to the likes of Amazon, Google and Facebook, the term Artificial Intelligence (AI) has become more widespread than ever before. Defined as a branch of computer science dealing with the simulation of intelligent behaviour in computers, AI promises all sorts, from self-driving cars and smart home appliances to robot “employees”. As algorithms become increasingly complex, AI has […]

264GB of client and payment data exposed

Security researchers at vpnMentor,  Noam Rotem and Ran Locar discovered the data leak at the Tech Data Corporation. It was identified that the consequential data breach exposed access to 264GB of client and payment data including private API keys, bank information, payment details, usernames and unencrypted passwords, full PII, SAP integrations, internal security logs and […]