Trend Results : "Cybersecurity"

Related Searches

Blog Post Results (1-20 of 3941)


Blockchain tech could fight voter fraud — and these countries are testing it

58 minutes agoTechnology : Venture Beat

GUEST: Cybersecurity issues continue to remain one of the hottest topics of the 2016 U.S. presidential elections as the November 8 showdown draws near. And fears have been raised that domestic or foreign actors could try to skew the results of the election. While many see a solution in dumping all forms of electronic voting and […]

Who is behind cyberattack on U.S. websites?

1 hour agoTechnology : Tech Talk

James Norton, founder and president of Play-Action Strategies, a cybersecurity firm, joins "CBS This Morning: Saturday" to discuss the New World Hackers, the hacking group that has claimed responsibility for downing a string of major U.S. websites, and precautions to take in the wake of the new cyberattacks.

IRONY: Hillary Clinton Lectured State Dept. Staff on Cybersecurity in 2010 (VIDEO)

If there’s anyone who needed a lecture about cyversecurity at the State Department it was Hillary Clinton, but in the... The post IRONY: Hillary Clinton Lectured State Dept. Staff on Cybersecurity in 2010 (VIDEO) appeared first on The Gateway Pundit.

#IBMWoW cognitive solutions for cyber threat analysis and collaboration

I’ll be attending IBM’s World of Watson 2016 in Las Vegas next week. I’m looking forward to hearing whether government and industry are collaborating any better as a result of the passage of The Cybersecurity Act of 2015. The Cyber Act...Show More Summary

Video: And now, a word from Hillary Clinton on the importance of government cybersecurity

Duties. The post Video: And now, a word from Hillary Clinton on the importance of government cybersecurity appeared first on Hot Air.

Microsoft launches its first full-scale Cybersecurity Engagement Center in India

After a year-long pilot, Microsoft today launched its first Cybersecurity Engagement Center in India. This center is located in Delhi and it will bring together Microsoft capabilities to foster deeper cybersecurity collaborations with public and private sector organizations and build a trusted and secure computing environment. Show More Summary

Here's how the 'Internet of Things' is being used for major cyberattacks on the enterprise

The Internet of Things has been held up as the next big technology revolution that will lower business costs and make employees more productive, but it brings with it major baggage for corporate leaders. Cybersecurity experts warn that...Show More Summary

This essay from last month about someone 'learning how to take down the internet' explains today's cyberattacks

Cybersecurity expert Bruce Schneier wrote an essay last month warning that someone was "learning to take down the internet," and it seems especially prescient after a number of major websites were taken offline Friday amid a major cyberattack. "...Show More Summary

Influential Cybersecurity Blogger Gets Digitally Attacked

Cybersecurity journalist Brian Krebs is no stranger to controversy or danger. Known to uncover online crime rings and fraud, Krebs has had plenty of experience with retalition. However, the recent digital attack on his website has raised concerns on internet censorship. Show More Summary

Cybersecurity experts: Podesta infiltrated by Russian hackers

Clinton chairman John Podesta was lured to the site by a shortened link in one of his emails - a practice known as “spearfishing"

The politics of proactive cybersecurity | #GHC16

Just in the past few days, the media has been filled wi […]

Behind the technology designed to prevent voter fraud

2 days agoTechnology : Tech Talk

Democracy nerds turn to data analysis and cybersecurity smarts to knock dead people off voter rolls and keep hackers from burrowing in

CenturyLinkVoice: Cybersecurity: Build, Buy or Partner

Ever wonder what people mean when they say buy, build or partner?

This ransomware is now one of the three most common malware threats

The total number of ransomware attacks rose by 13 percent in September alone, say Check Point cybersecurity researchers.

Musicians May Be The Key To The Cybersecurity Talent Shortage

Companies scrambling to find cybersecurity talent may want to look toward more creative candidates. Companies scrambling to find cybersecurity talent may want to look toward more creative candidates. In his mid-20s, Tom Donahue was faced with a choice. Show More Summary

Websites Can Store IP Addresses Without User Consen--To Improve Security, Says CJEU

The highest court in the European Union ruled that website operators can store IP addresses if they're used for cybersecurity or for other legitimate generic purposes, as long as they don't clash with users' fundamental rights.

There isn't a cybersecurity skills gap: Rik Ferguson

'Spend more time looking at humans, and not at pieces of paper', says Trend Micro's high-profile security researcher.

Why Don’t We Know More About Trump’s and Clinton’s Cybersecurity Policies?

Has personal cybersecurity ever been more political? So much of this presidential campaign has focused intense scrutiny on the security precautions taken to protect Hillary Clinton’s personal email server. But on Monday, the story changed...Show More Summary

Regulators to Toughen Cybersecurity Standards at Nation's Biggest Banks

U.S. regulators unveiled an initial plan to strengthen standards to minimize cybersecurity threats at the country’s largest banks.

Former Secretary of Defense: 'I have wasted more money on IT than anyone in history'

Learn the two watershed moments for IT in the military over the past 50 years and the four most important domains of cybersecurity, according to former DoD chief Robert Gates at Gartner Symposium.

Copyright © 2015 Regator, LLC