November 30, 2016
Via: Russel EdwardsSlowly, but firmly, digital security replaces cyber-security. Some may experience surprise or confusion. More articles, more companies’ resources and presentations use the new term instead of the traditional one. What is going on? How does digital security differ from cyber-security? […]
November 24, 2016
Via: Russel EdwardsSustainability in cyber-security may seem like a made up notion, but it isn’t. We stumbled upon it in CSO Online’s article on how DDoS Dyn attacks could have been prevented. When putting things into perspective, cyber sustainability makes a lot […]
November 16, 2016
Via: Russel EdwardsMarketsandMarkets, as quoted by Help Net Security, recently reported that the adaptive security market will gain considerable traction in the next five years. This success comes from the need to defend networks and IT systems against advanced threats. The expected […]
October 27, 2016
Via: Russel EdwardsNext Generation Firewalls, abbreviated NGFW, enforce network cyber security by bringing a modern solution to current threats. The upgraded hardware/software based protection system acts in detecting and/or blocking sophisticated attacks by reuniting more types of key assets. In fact, this […]
Application security, Editorial, Mobile security
October 19, 2016
Via: Russel EdwardsCyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and […]
Editorial, Network security, Virus & Malware
October 12, 2016
Via: Russel EdwardsAlarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose […]
October 5, 2016
Via: Russel EdwardsOnce a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ […]
September 28, 2016
Via: Russel EdwardsAs some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged […]
Editorial, Malware, Vulnerabilities
September 21, 2016
Via: Russel EdwardsMacro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need […]
Cyber warfare, Editorial, Privacy protection
September 15, 2016
Via: Russel EdwardsWhat should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational […]
Cyber warfare, Editorial, Vulnerabilities
August 18, 2016
Via: Russel EdwardsIgnorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove […]
Editorial, Network security, Wireless security
August 11, 2016
Via: Russel EdwardsIn what anonymity networks are concerned, all discussions revolved so far around Tor, its characteristics, its Dark Web gateway providing quality and its crucial role in tracking criminals in a few famous cases. Now that MIT researchers developed the Riffle […]
August 4, 2016
Via: Russel EdwardsAlthough a lot of unflattering virtual ink has been consumed to characterize hackers and many alarming things have been said about their skills, it is however incontestable that these people are extremely gifted, IT-wise. Turning the hackers’ talent toward law-abiding […]
July 28, 2016
Via: Russel EdwardsThe rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this […]
Application security, Editorial, Identity theft
July 20, 2016
Via: Russel EdwardsSmartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our […]
Access control, Editorial, Privacy protection
July 13, 2016
Via: Russel EdwardsManaging a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, […]
July 6, 2016
Via: Russel HowardsAny network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The […]
June 28, 2016
Via: Russel EdwardsCognitive computing simulates the human thought process in an artificial intelligence (cognitive) environment. Teaching a computer how to use the type of unstructured information usually employed by security analysts requires tools such as data mining, pattern recognition, human-computer interaction or […]
June 22, 2016
Via: Russel EdwardsWhen two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud. The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the […]
Cyber warfare, Editorial, Malware
June 16, 2016
Via: Russel EdwardsIn late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, combating malware, fighting […]
April 17, 2024