EU to Declare Cyber-Attacks “Act of War”

EU to Declare Cyber-Attacks “Act of War”

Posted by SGCS Admin, 01-11-2017

European Union member states have drafted a diplomatic document which states serious cyber-attacks by a foreign nation could be construed as an act of war.   The document, said to have been dev...

Lessons for EU to protect against next cyber attack

Lessons for EU to protect against next cyber attack

Posted by SGCS Admin, 01-11-2017

As the latest ransomeware attack 'Bad Rabbit' spreads through Europe, it is again clear that there are few degrees of separation between malware targets and global information technology networks. In...

Malaysian police still investigating claim that 46.2 million mobile numbers were leaked

Malaysian police still investigating claim that 46.2 million mobile numbers were leaked

Posted by SGCS Admin, 31-10-2017

PUTRAJAYA — Malaysia police are investigating the leak of 46.2 million mobile phone numbers of Malaysian telcos and mobile virtual network operators.   Inspector-General of Police Mohamad...

A Board Member

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management

Posted by SGCS Admin, 31-10-2017

James Lam has been an advisor to boards on matters of risk management and mitigation for roughly 25 years. He has been the Chief Risk Officer at GE Capital Markets Services, and Fidelity Investments. ...

Government cybersecurity trends and challenges

Government cybersecurity trends and challenges

Posted by SGCS Admin, 31-10-2017

Joe Jarzombek was the former Director for Software and Supply Chain Assurance at the U.S. Department of Homeland Security, and former Deputy Director for Information Assurance at the U.S. Department o...

Mobile Security—How Secure Are Your Mobile Devices, Actually?

Mobile Security—How Secure Are Your Mobile Devices, Actually?

Posted by SGCS Admin, 30-10-2017

Whether it’s searching embarrassing symptoms or letting curiosity win and checking out the latest photo leak, we all get up to some questionable things online from time to time—things we w...