Fortscale, which uses machine learning and big data analytics to detect malicious user behaviour, announced today a funding round of $7 million. The San-Mateo, Calif.-based startup developed software that analyzes the behavior of employees...Show More Summary
This February, Future Tense has been exploring the basics of cybersecurity self-defense as part of our ongoing project Futurography, which introduces readers to a new technological or scientific topic each month. Now’s your chance to...Show More Summary
Over the past month we’ve published a handful of articles about cybersecurity self-defense as part of our ongoing project Futurography, which introduces readers to a new technological or scientific topic each month. We’ve published articles...Show More Summary
Large-scale quantum computing may still be decades away, but the underlying physical laws are already being exploited in other parts of the technology industry. One of the most active areas is cybersecurity, where SK Telecom Co., Ltd. Show More Summary
Late last year, top cybersecurity investigators from a private firm and Russian intelligence were arrested in dramatic fashion. One was dragged out of a meeting with a bag over his head. All were disappeared. Details were scare at the time, but revelations from a new Reuters report now only complicate what we know. Read more...
Charges brought against a Kaspersky expert and state security offers stem from allegations of state secret leaks.
Microsoft last week opened a Cybersecurity Engagement Center in Mexico. This center will be taking advantage of Microsoft’s proactive role in matters of fighting cybercrime, particularly in the dismantling of criminal organizations that operate through Botnet schemes. Show More Summary
Cybersecurity threats range from Russia's influence on the U.S. elections to the ongoing theft by China of industrial intellectual property and North Korea's attacks on U.S. media. The post Blinking Red: Reconsidering U.S. Approaches to Cybersecurity appeared first on Foreign Policy Blogs.
Microsoft has announced a new initiative aimed at selling its cybersecurity smarts to public sector bodies across Latin America. The Cybersecurity Engagement Center, located in Mexico, represents part of a growing push by Microsoft to position itself as a security-focused company — which is crucial in an age where enterprises and public sector organizations are […]
In the wake of Chinese attacks into Bureau of Meteorology's systems in 2015, the Turnbull government made computer security a priority, saying hacking cost the national economy $1 billion annually. The response included a $230 million...Show More Summary
Called the “largest interconnected machine,” the US electricity grid is a complex digital and physical system crucial to life and commerce in this country. Today, it is made up of more than 7,000 power plants, 55,000 substations, 160,000 miles of...
Why you can ignore the advice of cybersecurity professionals to change all of your passwords after a security vulnerability was discovered at Cloudflare
What is ransomware and how can you defend your small business? Learn about the latest cybersecurity threat and how to stay safe. The post How to Protect Your Business From Ransomware appeared first on AllBusiness.com The post How to Protect Your Business From Ransomware appeared first on AllBusiness.com. Click for more information about Rieva Lesonsky.
If you thought cybersecurity looked bad from inside organisations, try looking in from the outside. From the hackers' perspective, it's even worse.
The Australian government has launched its first of five Joint Cyber Security Centres which will see industry, government, and law enforcement work together to develop new approaches to cybersecurity.
The recent RSA conference drew more than 43,000 people — a record number as the cybersecurity hole continues to widen with new exploits.
A Google Chrome scam that could infect your computer with malware continues to pose a threat to users, according to cybersecurity experts. Last month security company Proofpoint warned that hackers can inject script into poorly-protected web pages. Show More Summary
Modern cybersecurity tools can detect even the most subtle sign of suspicious activity in a company’s network, but administrators often don’t have time to check up on every alert. Dropbox Inc. set out to elevate the problem today by open-sourcing a chatbot that aims to automate much of the repetitive communications involved in the chore. Show More Summary
At RSA 2017, we met with executives at IBM Security, HPE, Hytrust, Zscaler, and Bracket Computing to talk about challenges in cybersecurity, IoT security, data sovereignty, cloud-based security, and more.
ABS, a leading provider of classification and technical services to the marine and offshore industries, has issued its first notation for the ABS Guide for Cybersecurity Implementation for the Marine and Offshore Industries. “The focus on cyber safety is increasing…