From the cyber front line


Can Blockchain Improve Cyber Security?

Submitted by CyberHub Summit on Wed, 04/03/2019 - 10:50
Can Blockchain Improve Cyber Security?
Can Blockchain Improve Cyber Security?

With huge amounts of dependence on the internet and being connected, it becomes increasingly difficult to secure data and hi-tech devices. Cybersecurity problems affect us all on a personal and professional level and on a routine basis in the form of malware, ransomware, phishing or threats to our privacy.

Cyber intrusions on the blockchain

Once thought to be impenetrable, hacking is now a known issue on the blockchain. In January 2019, Coinbase detected that the blockchain trading Ethereum was being hacked. 


Three Huge Cyber Security Threats

Submitted by CyberHub Summit on Fri, 03/29/2019 - 10:05
Three Huge Cyber Security Threats
Three Huge Cyber Security Threats

Cyber penetrations: the threats keep on coming, as do the countless corporate and individual victims. Whilst we battle the long hard fight against cyber penetration, the responsibility to self-educate lies in the hands of the consumer. The more you learn, the more you can prepare. 

Learn more about the current top three threats and decide how you want to stay protected.   


The Update on Cybercrime

Submitted by CyberHub Summit on Wed, 03/27/2019 - 10:39
The Update on Cybercrime
The Update on Cybercrime

Cybercrime is speeding up. In fact, hacking is the fastest growing American crime. As tech use and innovation surges, so do the hackers, identity thieves, cyber spies and cyber bandits, increasing the scale and cost to society at large.   

Ninety five percent of all breached targets come from government, retail and technology. This has little to do with cyber security standards within the industry and more to do with them being popular targets because of the information and data readily available. 


Departmental Cyber Risk

Submitted by CyberHub Summit on Thu, 01/24/2019 - 11:05
Departmental Cyber Risk
Departmental Cyber Risk

There is a distinct overlap between the rapidly developing cyber security landscape and much -needed resources within varying company departments.  

However, it’s a little complicated. 

Traditional ‘high-security risk’ departments are evolving and so are the lower-risk ones. The major areas to re-evaluate are the who and how in access to personal data, top-down power over employees, users of tech communication as part of everyday business, communicators with banks and financial decision-makers.


The Internet of our Things- What’s happening in 2019?

Submitted by CyberHub Summit on Wed, 01/09/2019 - 11:37
The Internet of our Things- What’s happening in 2019?
The Internet of our Things- What’s happening in 2019?

Consumer demands drive the supply market and it seems demands are increasing for smart and safe city conveniences. 

Along with multitudes of very trendy gadgets, Northstar, the UK based research company confirmed from a survey of 2000 global consumers, that the majority of us are expecting to surround our homes, bodies and workplaces with the assistance of advanced IoT.  


The 1st Data breach of 2019

Submitted by CyberHub Summit on Wed, 01/09/2019 - 11:29
The 1st Data breach of 2019
The 1st Data breach of 2019

The ball barely dropped at Times Square and the first data breach of the new year was already reported. Thirty thousand state Austrailian civil servants had their details stolen when a directory was downloaded by an unlicensed 3rd party, thought to have been ‘phished’ in the state of Victoria.    

This political level breach including work emails, phone numbers and job descriptions, has been reported to law enforcement agencies, the Australian Cyber Security Center and obviously the press are having a field day. 


Top 5 New Year Prophecies in Cyber

Submitted by CyberHub Summit on Wed, 01/09/2019 - 11:22
Top 5 New Year Prophecies in Cyber
Top 5 New Year Prophecies in Cyber

Whilst many are focusing on how they will improve their cyber security in 2019, we are busy preaching the future. We have spent countless hours, analyzing 2018 trends, looking forward, predicting and generating an awareness of what is likely to occur and we have boiled it down to 5 very likely scenarios.

Prophecy 1

Facebook’s privacy issues will spread to other social media targets. 


Automation in Cybersecurity: 2019

Submitted by CyberHub Summit on Wed, 01/09/2019 - 11:08
Automation in Cybersecurity: 2019
Automation in Cybersecurity: 2019

The WannaCry and Petya ransomware really shook us all to the core. The cyber security community realized that hackers were on their way to perfecting automated cyber-attacks. They use machines and AI (artificial intelligence) to search through database and website vulnerabilities and automatically put in malicious code to locate their victim. 

The whole process could in fact, be automated to the point that hackers would be making serious money in their sleep. Cyber hacking is on the verge of becoming the cutting edge of the millennial entrepreneurship bubble. 


Certificates, registration and crypto-agility.

Submitted by CyberHub Summit on Wed, 01/09/2019 - 11:01
Certificates, registration and crypto-agility.
Certificates, registration and crypto-agility.

Remember the days when Internet Explorer was the browser? Feels like a long time ago.. and that’s because it was, in terms of technology. 

In 2008 Google launched Chrome and it changed everything, the world wide web, for a start looked a hell of a lot better. Fast forward to 2019 ad Statcounter, reported that Chrome has a 59% market share, four times more than any of its rivals. 


Cyber Security Insurance - Why You Need it in 2019

Submitted by CyberHub Summit on Wed, 01/09/2019 - 10:50
Cyber Security Insurance - Why You Need it in 2019
Cyber Security Insurance - Why You Need it in 2019

Businesses are finally catching on to cloud technology and pretty much every business that you have ever known about, has gone online. Your local plumber now uses a local server, and sends you an invoice in an encrypted email…and yes, you can pay with bitcoin. 

Maybe that’s going a little bit too far. 

Perhaps not everyone is as advanced in terms of their cybersecurity as the cybersecurity startups that we follow, but they should be, right? Or better yet, if they can’t be on top of their cyber game, they should at least protect their assets.