Meet the CDO

Submitted by CyberHub Summit on Thu, 06/21/2018 - 15:58
Meet the CDO
Meet the CDO

The revenues on technology investment are increasing in all areas. From Insurance through to Oil and Gas, spending on cyber is becoming an integral part of every industry and several new positions have been created or are being redefined as a strategic and necessary part of the organizational structure to meet that challenge.  


Five Steps to Data Protection

Submitted by CyberHub Summit on Thu, 06/21/2018 - 15:12
Five Steps to Data Protection
Five Steps to Data Protection

Cybercrime incidents are snowballing, and no business, small or large, is invulnerable. The rates of attacks rise and so does the price tag on recovery, which includes financial losses, reputation and operational capacity.


Making Digital Currency trading a little safer.

Submitted by CyberHub Summit on Thu, 06/21/2018 - 14:12
Making Digital Currency trading a little safer.
Making Digital Currency trading a little safer.

Being a cautious group by nature, Cyber security enthusiasts always approach new digital currencies with caution. Forget the hype and the criminal element that places Bitcoin and the blockchain at the center of many an international drug scandal and on the SEC hitlist, the safety and security of everyday trading is troubling to cyber security enthusiasts.


Cyber Crime 2018

Submitted by CyberHub Summit on Thu, 06/21/2018 - 12:50
Cyber Crime 2018
Cyber Crime 2018

As we draw closer to the halfway point of 2018, a clear and alarming picture of cybercrime and its' true annual cost is emerging. With spending exponentially rising on both prevention and damage, the wake-up call that came from the IBM Chairman, Rometty back in 2015, that 'cyber-crime was the greatest threat to every company in the world' is simply becoming more of a reality, year by year.


How to recognize Tech Scams.

Submitted by CyberHub Summit on Tue, 06/19/2018 - 17:28
How to recognize Tech Scams.
How to recognize Tech Scams.

Google Chrome has been hit by a group of scammers, trying to intimidate users into paying for fake Tech Support.  Under the guise of providing assistance from a desktop cyber penetration, these sneaky hackers are worming their way into systems worldwide. Users, naturally more worried than suspicious by nature and prompted by an unhealthy dose of fear, give access to their details or pay for 'tech support'.


Vega Stealer

Submitted by CyberHub Summit on Tue, 06/19/2018 - 15:32
Vega Stealer
Vega Stealer

Marketeers, Public Relation Experts and Advertisers will be nervously shuffling their feet for a bit, whilst the Cyber Security professionals get to work on a new and potentially huge threat, Vega Stealer.

Recently uncovered by Proofpoint, Vega Stealer is the new sparkly malware found to be targeting the Retail, Manufacturing, Public relations and Advertising sectors.


Clickjacking Attacks

Submitted by CyberHub Summit on Tue, 06/19/2018 - 15:01
Clickjacking Attacks
Clickjacking Attacks

When we discuss the way that cyber criminals access your computer, the following spring to mind: DDos attacks; phishing; Firewall vulnerabilities; SQL injections. One form of attack that doesn't get so much hype but is just as dangerous as any other, is Clickjacking.