News

Dark Reading

4 Cybersecurity Best Practices for Electrical Engineers

Most electrical engineering firms are targeted by threat actors of opportunity because of two necessary ingredients: people and computers. These four tips will help keep you safer.
Market Report: Cutting-Edge Defense Tactics For Network Endpoints
CSHub

Market Report: Cutting-Edge Defense Tactics For Network Endpoints

In recent years, a dramatic increase in mobile devices has broadened the network endpoint definition. This Cyber Security Hub market report outlines the endpoint and attack challenge, presents 18 CISO tactics for endpoint defense, and strategies for self-assessment and security awareness.
Changing The Course Of History Means Every Month Needs To Be Cyber Security Month
CSHub

Changing The Course Of History Means Every Month Needs To Be Cyber Security Month

Winning against cyber-crime means we each need to provide actionable steps to people who don’t work in cyber security. Here are some simple steps that you can take to make a difference.
Signs Your Computer Has a Virus
Reader's Digest

Signs Your Computer Has a Virus

Even if you think you've been careful and not clicked on any suspicious links, you may have accidentally infected your computer. Here's how you can tell.
Lack of cyber investment could spell trouble for smart cities: report
SC Media

Lack of cyber investment could spell trouble for smart cities: report

A lack of investment in cybersecurity protections could imperil the future of smart cities and the Internet of Things devices on which they run, a new report from ABI Research warns. ABI anticipates there will be 1.3 billion wide-area network smart city connections by the year 2024. Of the $135 billion projected to be invested into critical inf...
The Ethics Of The IoT: Are Engineers Failing To Speak Up?
CSHub

The Ethics Of The IoT: Are Engineers Failing To Speak Up?

It’s easy to be complacent and give in to breach fatigue as each passing week brings a new cyber security breach, but engineers working on IoT projects are ethically bound to raise legitimate concerns about the safety and security of IoT products being developed.
Successful Digital Transformation Begins with a Cultural Transformation
CIO

Successful Digital Transformation Begins with a Cultural Transformation

Digital transformation marks a radical rethinking of how an organization uses technology, people, and processes to fundamentally change business performance.
How hackers used little-known credit-card feature to defraud Lansdale woman, $1.99 at a time
The Philadelphia Inquirer

How hackers used little-known credit-card feature to defraud Lansdale woman, $1.99 at a time

She was billed $1.99 by Google at least 64 times totaling $127.36 on six different credit cards. Capital One called it an "administrative error."
Managing the Risks of the Future Internet of Things
VIC Summit 2019

Managing the Risks of the Future Internet of Things

My presentation to the 2019 IEEE VICS in San Diego
Prepping for the Data Deluge
CIO

Prepping for the Data Deluge

According to a survey of 2,300 global business and IT leaders by MIT Technology Review Insights in association with Pure Storage, nearly 90% of respondents believe data is the key to delivering better results and future growth, especially for shaping a more personalized customer experience.
How to effectively align security with IT
ETCIO

How to effectively align security with IT

Experts believe that CIO and CISO should have clearly defined roles and responsibilities around issues such as how security technologies are selected, how security issues are resolved, and how to handle and escalate disagreements.
5G and What it Means for Cybersecurity
IEEE

5G and What it Means for Cybersecurity

The article from IEEE, through the expert notion from IEEE members, simplifies the idea of 5G and how will it change the cybersecurity scenario.
CrowdStrike tackles BIOS attacks with new Falcon features
TechTarget

CrowdStrike tackles BIOS attacks with new Falcon features

CrowdStrike announced it is enhancing its endpoint security platform, Falcon, to provide organizations with the visibility needed to detect and protect against BIOS attacks.
Why security-IT alignment still fails
CSO Online

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles.
Insider Threats: A Big Fear for Small Businesses
Security Boulevard

Insider Threats: A Big Fear for Small Businesses

Of the things that keep SMB leaders awake at night, insider threats rate at the top. Here’s why this threat is bigger for smaller companies.
6 Questions to Ask While Buying a Connected Car
Dark Reading

6 Questions to Ask While Buying a Connected Car

Here are six questions to keep in mind when you walk into the showroom to buy a networked car.
DHS-led agency works to visualize, share cyber-risk information
TechTarget

DHS-led agency works to visualize, share cyber-risk information

Read about a Department of Homeland Security initiative that proponents say strives to overcome long-standing obstacles to cybersecurity information sharing between the public and private sector.
6 Tips for Conducting a Digital Literacy Assessment
CMSWire

6 Tips for Conducting a Digital Literacy Assessment

The buyer's journey has changed, making digital literacy a must for today's businesses. Here are things to consider when doing a digital literacy assessment.
The Phishing Phenomenon: How To Keep Your Head Above Water
CSHub

The Phishing Phenomenon: How To Keep Your Head Above Water

Even with all the attention phishing scams have received, these cyber attacks are on the rise – and becoming more sophisticated.
Beware the holiday ‘smart toys’ that spy on your kids
The Philadelphia Inquirer

Beware the holiday ‘smart toys’ that spy on your kids

Many new toys are equipped with cameras and are linked to the internet, raising concerns that they are collecting information on children without permission.