Mobile security, Network security
May 18, 2018
Via: The HillLawmakers are trying to use the must-pass National Defense Authorization Act (NDAA) to take a hard-line stance against Chinese technology in U.S. markets. On Thursday, several lawmakers attempted to insert amendments into the fiscal 2018 NDAA aimed at keeping products […]
April 30, 2018
Via: Dark ReadingThe best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change. While security professionals like to think that a “network is a network,” in truth, every network is bespoke […]
March 26, 2018
Via: Threat PostThe Mozilla Foundation is testing a new mechanism for securing domain name server traffic that uses the encrypted HTTPS channel. It is an attempt to speed up the internet, reduce the threat of man-in-the-middle attacks and keep prying eyes from […]
February 23, 2018
Via: Security WeekGitHub this week permanently disabled a series of weak cryptographic standards across its software development platform in an attempt to better protect users. As of Feb. 22, 2018, the TLSv1/TLSv1.1 standard is no longer used on HTTPS connections to GitHub. […]
February 19, 2018
Via: CIOArtificial intelligence (AI) is cropping up everywhere in business, as organizations deploy the technology to gain insights into customers, markets and competitors, and to automate processes in almost every facet of operations. But AI presents a wide range of hidden […]
Privacy protection, Security, Tech
February 14, 2018
Via: We Live SecurityRegardless of your favorite or most hated device due to security concerns, the technologists behind them and the software they use, should share a key concern: “Security by design (and by default)”. While a strong line of prose, Security by […]
February 14, 2018
Via: itCuratedGiven the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]
December 20, 2017
Via: Michael BoydThe importance of incident management is increasing. We’ve gotten to the point where every company, regardless of size, needs to have a proper Incident Management Process implemented. Why is it so important? Simply because no one is exempt from […]
December 20, 2017
Via: Naked SecurityLooking for digestible, not-too-technical holiday season security advice? Here’s a video that gives you some handy tips that you can use yourself, or pass on to friends and family so they don’t get scammed while they’re supposed to be enjoying […]
December 15, 2017
Via: CIODigital disruption hasn’t reached its zenith, leaving many CEOs still desperate to learn how to get ahead of it. Fear not: PwC principal Tom Puthiyamadam is on a mission to save corporate C-suites from themselves. Some CEOs are embarking on […]
December 14, 2017
Via: Help Net SecurityReliability, security and quality of service all rank above cost when evaluating networking solutions providers. Spiceworks surveyed U.S.-based IT professionals who have influence on their organizations’ Ethernet, MPLS and SD-WAN purchase decisions. The survey gathered data around the challenges, benefits […]
December 13, 2017
Via: Security WeekIf you’ve been watching, we’ve now entered the age of artificial intelligence, machine learning, and expanding automation. The capacity of modern computing to recognize patterns and make decisions based on boggling amounts of data has created new solutions and increasing […]
October 19, 2017
Via: Security WeekDid you lock your front door this morning? Chances are, the answer is yes (and if not, you’re scrambling to text your spouse to make sure that he or she did after you left). The idea of leaving your place […]
September 18, 2017
Via: Help Net SecurityA week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The same mechanism can also be used to make purchases […]
Network security, Privacy protection
September 14, 2017
Via: TechRadarMicrosoft is set to further bolster Window 10’s privacy tools in the upcoming Fall Creators Update, having revealed new changes people can expect when they download the free update from October 17. In a blog post Marisa Rogers, Windows Devices […]
Network security, Threats & Malware
September 13, 2017
Via: Security IntelligenceYou read the headlines and understand industry trends. There are plenty of horror stories to reference. Organizations have had their reputations destroyed and entire corporations have gone out of business due to insider attacks. How can you avoid being the […]
September 12, 2017
Via: CSO OnlineRead a security related press release or been to an event recently? You’ve no doubt been wondering how you managed to do your job all this time without Artificial Intelligence (AI) or Machine Learning (ML).Do these technologies really live up […]
September 11, 2017
Via: CSO OnlineFor those of us in the healthcare industry, and I suspect many others, the WannaCry ransomware attack is now referred to as the weekend without sleep. In my organization, a cross-section of folks from all areas spent most of their […]
September 10, 2017
Via: Jeremy CorkwellThe cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity […]
September 8, 2017
Via: CIOMachine learning is transforming business. But even as the technology advances, companies still struggle to take advantage of it, largely because they don’t understand how to strategically implement machine learning in service of business goals. Hype hasn’t helped, sowing confusion […]