Advertisement
Top

Tag: Cyber


Vulnerabilities

Internet of Everything attack surface grows

April 16, 2015

Via: vulnerabilities

The proliferation of more than 16 billion connected computing devices today has significantly expanded the #attack surface of our interconnected world. Unauthorized, BYOD, vulnerable Internet of Things (IoT) devices, and a rapidly expanding market of low-cost, plug-and-play, cyber espionage devices […]


Cyber-crime

Chinese government linked to largest DDoS attack in GitHub history

April 7, 2015

Via: cyber-crime

On March 26, 2015, a very well-coordinated distributed denial of service (#ddos) #attack was waged on GitHub, the heir apparent to the now-closing Google Code. GitHub characterized this as the largest DDoS in its history. The Electronic Frontier Foundation (EEF) […]


Cyber-crime

Congress moves quickly on cyberthreat information sharing

April 2, 2015

Via: cyber-crime

The U.S. Congress is moving forward quickly with legislation that would encourage private companies to share cyberthreat information with government agencies, despite concerns that two leading bills weaken consumer privacy protections. The House of Representatives Intelligence Committee voted Thursday to […]


Data loss

Four advantages of an identity behavior-based approach to cybersecurity

March 24, 2015

Via: data-loss

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 percent from 2013 to 2014 and will grow another 8 percent in 2015. Additionally, […]