Cybersecurity quandary: Is the third party betraying us?

The survey concludes that although nearly 80% of respondents believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years. Few organizations are, however, prepared to mitigate the risks. Is, then, a third party betraying us or we are just inattentive? This issue must, anyway, …

Continue reading Cybersecurity quandary: Is the third party betraying us?

5G security: Is the cheese already moved?

With 5G just around the corner, it seems that people are struggling to understand all its facets - including cybersecurity. The 5G brings far-reaching changes, significantly different from previous generations of mobile communication networks as it will cause major modifications in technology and network architecture. This architecture will connect an enormous volume of the internet …

Continue reading 5G security: Is the cheese already moved?

Deepfake: A fake news on steroids

Instead of being mostly textual, the fake news era brings digitally altered video and audio also known as deepfakes. These have a real potential to further erode already undermined public trust in journalism but also to cause serious security impediments. The term deepfake was first coined on the online platform Reddit in 2017 by an …

Continue reading Deepfake: A fake news on steroids

Weak cybersecurity can make benefits of the 4IR null and void

Raising cybersecurity awareness designates a necessary step in successfully addressing cybersecurity issues of the 4th Industrial Revolution and forming ‘cyber intelligent’ leadership, workforce and citizenry. The backdrop Almost all organisations in the future will be digital, and 60% of all global GDP will come from digital sources by 2022, according to the World Economic Forum …

Continue reading Weak cybersecurity can make benefits of the 4IR null and void

Your Carmaker is Hacking You!

Although some people think that hacking modern cars rather belong to Hollywood scenarios, we advise you to take preliminary measures and prevent bellicose surprises.   MERCEDES has recently sparked a privacy row by admitting it spies on drivers with tracking devices covertly installed in its cars. The secret sensors, fitted to all new and used …

Continue reading Your Carmaker is Hacking You!

Habituation as cybersecurity nightmare and panacea

A number of studies confirmed that people often have a tendency to find ways to work around organisational cybersecurity policies. This     is actually not something that they    do on purpose but rather based on their habits. In other words, this behaviour is an effect of bad habituation. Achieving individual objectives and finding the way of …

Continue reading Habituation as cybersecurity nightmare and panacea

Digital Twin technology is cool but the benefits must be protected

Heavily depending on IoT and the human factor that handling the Digital Twin technology, the benefits and major security risks are inevitably linked to these two factors. Digital Twin technology The Digital Twin technology is described as a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used …

Continue reading Digital Twin technology is cool but the benefits must be protected