Trend Results : "Cybersecurity"

Blog Post Results (1-20 of 3077)


Stronger Locks, Better Security

Topic: IT Security For Libraries What if, in response to the terrorist attacks in Paris, or cybersecurity attacks on companies and government agencies, the FBI had come to the American people and said: In order to keep you safe, we need you to remove all the locks on your doors and windows and replace them with weaker ones. Show More Summary

Cybersecurity experts warn about ModPOS malware aimed at retailers

Just as millions of Americans are steeling themselves for the holiday shopping season, cybersecurity researchers are warning about a stealthy malware aimed at stealing credit card and debit card numbers from retailers. Cybersecurity firm iSight Partners revealed research about the malware, dubbed...

Everybody Else Is Reading This

Law Firm Life Is Terrible For Your Health Above The Law 5 Medical Devices Featured In TIME’s Best Inventions Of 2015 MedCity News FERC, Congress Take Aim At Cybersecurity Risks In The Electric Utility Sector Breaking Energy

Future Tense Newsletter: Giving Thanks for Cybersecurity

Howdy Slate-liens, Happy Thanksgiving! Will you be heading out to some of America’s dying department stores for our annual ritual of post-consumption commercial gluttony this Friday? If so, look out for the Salvation Army’s new digital red kettles. Show More Summary

ACLU Sues Over Cybersecurity Information Sharing Act

The Cybersecurity Information Sharing Act isn't even law yet, but it's already causing lawsuits. CISA, recently passed in the Senate and one of a trio of proposed cybersecurity laws, encourages companies to share cybersecurity information with the government. The law has been decried as a cybersurveillance measure, not a......

Just in time for holiday shopping: Researchers warn of stealthy, credit-card-stealing malware

3 days agoTechnology : Post Tech

Just as millions of Americans are steeling themselves for one of the biggest shopping weekends of the year, cybersecurity researchers are warning about a stealthy malware aimed at stealing credit card and debit card numbers from retailers. Cybersecurity firm iSight on Tuesday publicly disclosed research about the malware, dubbed ModPOS, which the company says is largely […]

The Hidden Costs of Cyber Attacks

The real costs of cyber attacks are difficult to understand.  The impacts of cybersecurity are terribly challenging to measure, which creates significant problems for organizations seeking to optimize their risk posture. To properly prioritize security investments, it is crucial to understand the overall risk of loss. Show More Summary

What Will Keep Palo Alto Networks Secure

Most favored among cybersecurity firms, Palo Alto Networks can’t afford to slow down.

A Month Ago, Dianne Feinstein Said Cybersecurity Was Super Important... Now She Says We Should Undermine Encryption

3 days agoIndustries / Law : Techdirt

Look, everyone has known for quite some time that Senator Dianne Feinstein's big push for so-called "cybersecurity" legislation in the form of CISA had absolutely nothing to do with cybersecurity. It was always about giving another surveillance tool to her friends at the NSA. Show More Summary

Canada Receive 77% Grade for Cybersecurity Readiness

Canada has received an overall rating of 77%, or “C+”, for its cybersecurity readiness from Tenable Network Security, a continuous network monitoring company based in Columbia, Md, which measured cybersecurity readiness levels in six countries. Show More Summary

Symantec sharpens security arsenal

Symantec is about to start life as a stand-alone cybersecurity vendor.

Car Hacking Tops List of 2016 Cybersecurity Threats

It's not just computers that are vulnerable to hacking. According to McAfee Labs' 2016 Threats Prediction report, our dystopian near-future will see rapid increases in hacked wearables, p0wned critical infrastructure, and, yes, cyber attacks on your cars. Get ready to add car hacking to your list of cybersecurity issues......

Why the UK Is Simulating a Cyber Terrorist Attack on London

The fake attack hopes to attract real talent to address Britain's cybersecurity skills shortage.

Microsoft Is Ready To Compete For Seven-Figure Cybersecurity Deals

The worldwide cybersecurity industry is defined by market sizing estimates that range from $77 billion in 2015 to $170 billion by 2020. This makes it one of the fastest growing tech sectors. Million dollar plus cybersecurity deals (vendors selling to end-users) are on the rise. In a recent research note, analysts at [...]

How should we approach cybersecurity in the wake of terrorist attacks?

In the wake of the deadly Paris attacks, technology has been a major topic of discussion — how is it used to plan these attacks, and how could it be used to prevent them in the future? See also: Should encryption really be enemy No.Show More Summary

Eleven Key US Government Cybersecurity Sectors at Risk From Attack

A report by GAO reveals that eleven out of 15 key US government departments and agencies reviewed for their cybersecurity responsibilities remain at significant risk from terrorists and other hackers.

ISIS’s OPSEC Manual Reveals How It Handles Cybersecurity

ISIS documents obtained by US researchers detail the security measures recruits should take to avoid surveillance, though not all of them follow the advice. The post ISIS’s OPSEC Manual Reveals How It Handles Cybersecurity appeared first on WIRED.

Google's VirusTotal Makes Scanning Websites For Malware Fast And Easy

Google has quietly snapped up some interesting cybersecurity companies over the years. In 2012, they acquired VirusTotal - an online virus and malware scanner which continues to operate on its own at  This nifty tool is one of the best kept secrets on the web. You can take VirusTotal for [...]

How Japan Is Getting Its Act Together on Cybersecurity

This piece was originally published in New America’s digital magazine, the New America Weekly. Japan, long seen by some as being slow to the uptake in terms of cybersecurity, is now coming out of the gates with a vengeance. A few things have come together to catalyze Japan’s growing efforts in cybersecurity. Show More Summary

Copyright © 2015 Regator, LLC