Trend Results : "Cybersecurity"

Blog Post Results (1-20 of 3703)


America's Schools Have A Big Cybersecurity Problem

With the 2016-2017 school year already underway, it’s time to draw attention to an ongoing and very serious problem facing the US education system: our schools are ill-equipped to face the mounting threats posed by hackers. While the...Show More Summary

China invites Microsoft to join Technical Committee 260 (TC260) to draft cybersecurity rules

China is now allowing foreign companies to join Technical Committee 260 (TC260), a key government committee in an effort to define cybersecurity standards. Microsoft was also invited to join this committee to take an active part in drafting rules. TC260 originally has 48 members and it was expanded in January to 81 members, mainly includes […]

China Invites Microsoft, Intel to Join Elaboration of Cybersecurity Standards

Chinese authorities have invited foreign hi-tech companies to participate in activities of the government committee aimed at elaboration of cybersecurity rules for such companies.

Ensuring Cybersecurity In Fintech: Key Trends And Solutions

Exciting things are happening these days at the intersection of digital technology and financial services. The fintech startup ecosystem is thriving, thanks in part to an infusion of $14.5 billion globally in venture funding in 2015, up from $7.3 billion in 2014. Fintech companies are creating and rolling out a [...]

Apple Patches iOS Against Spyware Threat

US technology corporation Apple has issued a global security update to address a vulnerability in its mobile operating system following the attempted breach into an iPhone belonging to Arab activist Ahmed Mansoor, cybersecurity company Lookout said in a news release on Thursday.

China Moves to Ease Foreign Concerns on Cybersecurity Controls

China is taking a more inclusive tack in imposing cybersecurity standards on foreign technology companies, allowing them to join a key government committee in an effort to ease foreign concerns over planned domestically-set controls...

This New Free Tool Assesses Cybersecurity Readiness For Small and Medium Sized Businesses

You can now take advantage of a simple and free tool that will help you determine how mature your company's cybersecurity operations are.

Where Clinton And Trump Stand On Cybersecurity And Privacy

Clinton generally favors continuing Obama's cyber policies, while Trump calls for more cyber warfare and surveillance. Clinton generally favors continuing Obama's cyber policies, while Trump calls for more cyber warfare and surveillance. Show More Summary

New Black Hat Cybersecurity Buzzwords

In the pithy words of Monzy Merza at TechCrunch, the annual Black Hat briefings are an opportunity for the hoi-polloi "to drink from the firehose." While the lions' share of know-how and information will no doubt be devoured and processed by the brainiest of cybersecurity experts and hackers, the rest......

Will these Chinese satellites provide “hack-proof” data security?

China has launched a quantum-encrypted satellite that could prove a major cybersecurity breakthrough if it proves truly “hack proof.” The implications of the recent satellite launch was came via Abu Dhabi-based The National. The experimental...Show More Summary

CYBERSECURITY: New York Times Says Suspected Russian Hackers Targeted Moscow Bureau. “We are cons…

CYBERSECURITY: New York Times Says Suspected Russian Hackers Targeted Moscow Bureau. “We are constantly monitoring our systems with the latest available intelligence and tools,” Times spokeswoman Eileen Murphy told the newspaper. “We have seen no evidence that any of our internal systems, including our systems in the Moscow bureau, have been breached or compromised.” Earlier […]

Russian hackers suspected in hack of New York Times, others - CNET

Newspaper says its Moscow bureau was the target of a cybersecurity breach but that there is no evidence hackers were successful.

Cybersecurity researchers design a chip that checks for sabotage

BROOKLYN, New York -- With the outsourcing of microchip design and fabrication worldwide, a $350 billion business, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. These "Trojan horses"...Show More Summary

Study: Some Hospitals Lack Even Basic Data Protection for Patient Records

Hospitals, doctor’s offices, and other care facilities could be doing a better job of protecting medical records, according to a new study that looked at U.S. health care providers’ cybersecurity. The Healthcare Information and Management...Show More Summary

Connected Ships, Smart Data, Cybersecurity to Feature in SHIPPINGInsight

(Marine NewsWire) Ship connectivity, smart data and cybersecurity will be central themes on the agenda at the fifth SHIPPINGInsight Fleet Optimization Conference & Exhibition.

This Silicon Valley venture fund keeps betting millions on D.C.’s cyber community

Bessemer Venture Partners just took three local cybersecurity start-ups under its wing.

Ask an Expert: All About Cybersecurity and Staying Safe

Security researchers and “white hack” hackers work hard to weed out potential exploits in software and networks that could be used for malicious intents. How do they stay ahead of the threats, and what can you do to protect yourself? Read more...

Funniest/Most Insightful Comments Of The Week At Techdirt

last weekIndustries / Law : Techdirt

This week there was a lot of reaction to the DNC's creation of a Cybersecurity Board that doesn't include a single cybersecurity expert, and both our first place comments (as well as a couple editor's choices) came in response to that post. Show More Summary

Copyright © 2015 Regator, LLC