Trend Results : "Cybersecurity"

Related Searches

Blog Post Results (1-20 of 2828)


Cybersecurity: The Lame Game

It can’t be easy to design computer games for the very paranoid. At various points while trying out the U.K. Cyber Security Challenge games, which were designed to identify and train cybersecurity professionals, I managed to convince...Show More Summary

Cybersecurity – Sometimes The Problem Is You

The weak link is often not the software you use to store your files; it’s you and your policies (or lack of policies) for accessing files.

Meet Washington's Unlikely New Cyber Regulator

By Eben Kaplan The United States has a new cybersecurity regulator and it’s the Federal Trade Commission (FTC). If you missed the announcement, that’s because there was none. The FTC was not bestowed these new powers by an act of Congress nor by executive order from the White House, but rather [...]

Forget Information Sharing

Before it adjourned in August, Congress delayed a vote on the controversial and dangerous Cybersecurity Information Sharing Act. This is definitely for the best—CISA is deeply flawed legislation that would do more to put citizens’ private data in the hands of the government than to actually make progress on critical cybersecurity issues. Show More Summary

New Malware Called YiSpecter Is Attacking iOS Devices in China And Taiwan

Cybersecurity firm Palo Alto Networks has identified new malware, which it calls YiSpecter, that infects iOS devices by abusing private APIs. Most affected users live in China and Taiwan. Read More

Pentagon Failed to Secure Most Cyber Vulnerabilities in the Last Year

In the span of one year, the Pentagon only managed to address fewer than half of the cybersecurity recommendations to secure vulnerabilities pointed out by its inspector general's office.

#IOT Cybersecurity for Internet of Things Affects Reputation

Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike. Just think, you can already do the following: Track your health. Track your kids. Track your home. Show More Summary

Department of Defense Finally Requires Contractors To Report Major Cybersecurity Breaches

4 days agoTechnology / Gadgets : Gizmodo

Today the Department of Defense announced that it will soon require all of its contractors to report any major cybersecurity breaches. And if your first question is, why in the hell didn’t they require that before?, that’s a great question. Read more...

Cybersecurity legend and presidential candidate John McAfee takes on the Republican frontrunners

His ticket? Personal privacy... and digital freedom, for all Americans. Call it the “Cyber Party”. Like him or not, McAfee is good for the election because he is going to force the action around cybersecurity. Our nation is at risk for cyber-warfare. Our corporations are at risk for cyber-espionage and digital [...]

Cybersecurity System IDs Malware Hidden in Short Twitter Links

A machine classification system can identify harmful website links on Twitter within seconds of being clicked

The Growth of Cybersecurity

Cybersecurity remains one of the largest concerns for many of today’s largest institutions. Hackers have become more prevalent than ever and are always finding new ways around the latest internet security precautions. There are many different kinds of information that these hackers seek. Show More Summary

Minecraft is being used to seek out cybersecurity talent

The UK government and Cyber Security Challenge UK have launched a new 3D video game platform that’s aiming to seek out the next generation of cybersecurity geniuses. Funded by the Cabinet Office, the browser-based MMO game asks anyone who’s interested to participate by cracking codes and completing security-related challenges. Show More Summary

US Cybersecurity Policy In One Sad Cliche: 'People Who Live In Glass Houses Shouldn't Throw Rocks'

The US doesn’t have a problem punishing foreign hackers. The government killed an ISIS hacker with a drone in August. It quickly sanctioned North Korea following the Sony hack. So why hasn’t the United States retaliated against the OPM hackers? More »      

Why US talks will not be enough to make China ditch cyberwar

You can't trust treaties to look after your cybersecurity, says Hal Hodson – organisations must protect their own data

US Cybersecurity Policy in One Sad Cliche: "People Who Live in Glass Houses Shouldn’t Throw Rocks"

6 days agoTechnology / Gadgets : Gizmodo

The US doesn’t have a problem punishing foreign hackers. The government killed an ISIS hacker with a drone in August. It quickly sanctioned North Korea following the Sony hack. So why hasn’t the United States retaliated against the OPM hackers? Read more...

Introducing the Internet of Things Security Foundation

by Angela Guess A recent article out of ARC Advisory group reports, “The Internet of Things Security Foundation (IoTSF) has officially launched and set out its plans to respond to rising concerns surrounding cybersecurity challenges in IoT. Show More Summary

The Real Lesson of the OPM Breach

As Chinese President Xi Jinping returns home from Washington, a cybersecurity “understanding” has been announced between China and the United States. Unfortunately, it’s unclear whether the understanding would have prevented cybershenanigans such as the likely Chinese copying of more than 21 million records from the U.S. Show More Summary

Notorious US Surveillance Bill May Kill Internet Privacy in Senate This Week

The US Congress, faced with a possible government shutdown, is allegedly considering the re-introduction of the Cybersecurity Information Sharing Act (CISA) this week.

Raytheon to Provide Mission Critical Cybersecurity Solutions to US DHS

The U.S. Department of Homeland Security (DHS) has selected Raytheon Company to be the prime contractor and systems integrator for the agency’s Network Security Deployment (NSD) Division. NSD is responsible for the National Cybersecurity...Show More Summary

Copyright © 2015 Regator, LLC