Topic: IT Security For Libraries What if, in response to the terrorist attacks in Paris, or cybersecurity attacks on companies and government agencies, the FBI had come to the American people and said: In order to keep you safe, we need you to remove all the locks on your doors and windows and replace them with weaker ones. Show More Summary
Just as millions of Americans are steeling themselves for the holiday shopping season, cybersecurity researchers are warning about a stealthy malware aimed at stealing credit card and debit card numbers from retailers. Cybersecurity firm iSight Partners revealed research about the malware, dubbed...
Law Firm Life Is Terrible For Your Health Above The Law 5 Medical Devices Featured In TIME’s Best Inventions Of 2015 MedCity News FERC, Congress Take Aim At Cybersecurity Risks In The Electric Utility Sector Breaking Energy
Howdy Slate-liens, Happy Thanksgiving! Will you be heading out to some of America’s dying department stores for our annual ritual of post-consumption commercial gluttony this Friday? If so, look out for the Salvation Army’s new digital red kettles. Show More Summary
Our government doesn’t care about digital freedom, and […]
The Cybersecurity Information Sharing Act isn't even law yet, but it's already causing lawsuits. CISA, recently passed in the Senate and one of a trio of proposed cybersecurity laws, encourages companies to share cybersecurity information with the government. The law has been decried as a cybersurveillance measure, not a......
Just as millions of Americans are steeling themselves for one of the biggest shopping weekends of the year, cybersecurity researchers are warning about a stealthy malware aimed at stealing credit card and debit card numbers from retailers. Cybersecurity firm iSight on Tuesday publicly disclosed research about the malware, dubbed ModPOS, which the company says is largely […]
The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which creates significant problems for organizations seeking to optimize their risk posture. To properly prioritize security investments, it is crucial to understand the overall risk of loss. Show More Summary
Most favored among cybersecurity firms, Palo Alto Networks can’t afford to slow down.
Look, everyone has known for quite some time that Senator Dianne Feinstein's big push for so-called "cybersecurity" legislation in the form of CISA had absolutely nothing to do with cybersecurity. It was always about giving another surveillance tool to her friends at the NSA. Show More Summary
Canada has received an overall rating of 77%, or “C+”, for its cybersecurity readiness from Tenable Network Security, a continuous network monitoring company based in Columbia, Md, which measured cybersecurity readiness levels in six countries. Show More Summary
Symantec is about to start life as a stand-alone cybersecurity vendor.
It's not just computers that are vulnerable to hacking. According to McAfee Labs' 2016 Threats Prediction report, our dystopian near-future will see rapid increases in hacked wearables, p0wned critical infrastructure, and, yes, cyber attacks on your cars. Get ready to add car hacking to your list of cybersecurity issues......
The fake attack hopes to attract real talent to address Britain's cybersecurity skills shortage.
The worldwide cybersecurity industry is defined by market sizing estimates that range from $77 billion in 2015 to $170 billion by 2020. This makes it one of the fastest growing tech sectors. Million dollar plus cybersecurity deals (vendors selling to end-users) are on the rise. In a recent research note, analysts at [...]
In the wake of the deadly Paris attacks, technology has been a major topic of discussion — how is it used to plan these attacks, and how could it be used to prevent them in the future? See also: Should encryption really be enemy No.Show More Summary
A report by GAO reveals that eleven out of 15 key US government departments and agencies reviewed for their cybersecurity responsibilities remain at significant risk from terrorists and other hackers.
ISIS documents obtained by US researchers detail the security measures recruits should take to avoid surveillance, though not all of them follow the advice. The post ISIS’s OPSEC Manual Reveals How It Handles Cybersecurity appeared first on WIRED.
Google has quietly snapped up some interesting cybersecurity companies over the years. In 2012, they acquired VirusTotal - an online virus and malware scanner which continues to operate on its own at VirusTotal.com. This nifty tool is one of the best kept secrets on the web. You can take VirusTotal for [...]
This piece was originally published in New America’s digital magazine, the New America Weekly. Japan, long seen by some as being slow to the uptake in terms of cybersecurity, is now coming out of the gates with a vengeance. A few things have come together to catalyze Japan’s growing efforts in cybersecurity. Show More Summary