February 1, 2019
Via: The HillLawmakers fear that increased threats from foreign actors, combined with lingering effects from the government shutdown, are making the U.S. more susceptible to cyberattacks. The Department of Homeland Security (DHS) issued its first-ever emergency directive during the record-long shutdown, requiring […]
January 12, 2019
Via: Michael BoydHundreds of millions of people use a smartphone daily, if not hourly. It’s amazing how this small device contains all your most personal information: passwords, contacts, messages. Even companies heavily rely on them to keep in touch with both their […]
January 11, 2019
Via: Threat PostWhen it comes to IoT, the priority at CES is the “wow factor” – but not so much a focus on security. With the Consumer Electronics Show (CES) afoot this week, headlines are crammed with the offbeat connected products from […]
Network security, Vulnerabilities
January 10, 2019
Via: Threat PostShould we pump the brakes on the rollout of biometric security to first consider whether we are creating new vulnerabilities? This year thousands of consumers unwrapped new smartphones and laptops which come with biometric sensors that are intended to protect […]
Network security, Wireless security
December 27, 2018
Via: Security Intelligence5G is just around the corner. With its blazing fast speeds and lower latency, the way we use technology is bound to change forever and in every way. As these fascinating developments unfold, security will have to undergo significant changes […]
December 21, 2018
Via: Help Net SecurityToday’s AI cannot replace humans in cybersecurity but shows promise for driving efficiency and addressing talent shortage, a new report by ProtectWise has shown. Conducted by Osterman Research, the study explores usage trends and sentiments toward AI among more than […]
December 3, 2018
Via: Help Net SecurityHigh penetration of Industrial Internet of Things (IIoT) technology in critical infrastructure and the manufacturing sector has resulted in a growing number of potential cyber-attack surfaces. According to a recent analysis from Frost & Sullivan, cyber-attacks within the energy and […]
November 15, 2018
Via: Aberdeen EssentialsJust because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity. The percentage of mid-market businesses that have experienced a cyber-attack is up from 55% in 2016 to 61% in 2017, meaning these companies […]
November 8, 2018
Via: Help Net SecurityEnsuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of any organization’s security strategies today. However, establishing a SOC is a complicated endeavor, particularly when it comes to balancing the […]
October 22, 2018
Via: Help Net SecurityA majority of companies (54 percent) are worried that they will soon outgrow their security solutions, according to Threat Stack. While budgets are expected to increase by 19 percent over the next two years, organizations are struggling with a disconnect […]
September 17, 2018
Via: Dark ReadingSecurity requires smart people, processes, and technology. Too often, the “people” portion of the PPT equation is neglected. Worldwide spending on digital transformation technologies is expected to reach nearly $1.3 trillion this year, according to a forecast from IDC. But […]
August 18, 2018
Via: AberdeenContact centers have an ever-growing list of applications (e.g., routing, agent desktop, WFO) they use to meet and exceed customer needs. As companies try to keep up with these technologies, they must consider how they access them. Specifically, do they […]
August 17, 2018
Via: AberdeenDevOps tooling such as Chef, Puppet and Ansible ushered in a whole new era of optimization. Doing more with less, doing it more efficiently and empowering faster innovation has become the mainstay within DevOps. The drum beats loudly, and the […]
August 7, 2018
Via: CSO OnlineLast week, Cisco jumped head first into the identity and access management (IAM) market with its acquisition of Duo Security for over $2.3 billion. Now, I’ve been chatting with Cisco about identity management for many years. Cisco always understood the […]
August 2, 2018
Via: CSO OnlineMore than a decade ago, I was giving an introductory presentation on quantum cryptography, as I had done many times before. I discussed the basic concepts of quantum physics, quantum computers, and quantum cryptography. I ended it with the promise […]
July 20, 2018
Via: AberdeenWhether in transit or at rest, data is the world’s most sought-after commodity. Organizations today are investing heavily in cybersecurity, which has escalated to an executive-level discussion as cybercriminals devise increasingly complex attacks in greater and greater numbers. Storing and […]
June 26, 2018
Via: Security IntelligenceComputing and cybersecurity aren’t changing — they’ve already changed. End users have transformed the way IT works, and this means the widely accepted definition of endpoints has morphed. End users want to be connected to everything, which means virtually everything […]
June 19, 2018
Via: Security IntelligenceHumans versus machines: Who’s the better hacker? The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI, and this influx suggests the answer is likely machine. With each innovation in technology comes the […]
June 18, 2018
Via: Dark ReadingTeaching users why it’s important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here’s how. IT usage and security policies can be an annoyance for employees who simply see them […]
Network security, Security, Tech
May 31, 2018
Via: Dark ReadingSecurity budgets are growing and so are security costs, with drivers coming from all sides: data breaches that are more frequent and more expensive to remediate; preventative technologies that are costly to buy and maintain; and talent that remains both […]