News

Signs Your Computer Has a Virus
Reader's Digest

Signs Your Computer Has a Virus

Even if you think you've been careful and not clicked on any suspicious links, you may have accidentally infected your computer. Here's how you can tell.
Lack of cyber investment could spell trouble for smart cities: report
SC Media

Lack of cyber investment could spell trouble for smart cities: report

A lack of investment in cybersecurity protections could imperil the future of smart cities and the Internet of Things devices on which they run, a new report from ABI Research warns. ABI anticipates there will be 1.3 billion wide-area network smart city connections by the year 2024. Of the $135 billion projected to be invested into critical inf...
The Ethics Of The IoT: Are Engineers Failing To Speak Up?
CSHub

The Ethics Of The IoT: Are Engineers Failing To Speak Up?

It’s easy to be complacent and give in to breach fatigue as each passing week brings a new cyber security breach, but engineers working on IoT projects are ethically bound to raise legitimate concerns about the safety and security of IoT products being developed.
Successful Digital Transformation Begins with a Cultural Transformation
CIO

Successful Digital Transformation Begins with a Cultural Transformation

Digital transformation marks a radical rethinking of how an organization uses technology, people, and processes to fundamentally change business performance.
How hackers used little-known credit-card feature to defraud Lansdale woman, $1.99 at a time
The Philadelphia Inquirer

How hackers used little-known credit-card feature to defraud Lansdale woman, $1.99 at a time

She was billed $1.99 by Google at least 64 times totaling $127.36 on six different credit cards. Capital One called it an "administrative error."
Managing the Risks of the Future Internet of Things
VIC Summit 2019

Managing the Risks of the Future Internet of Things

My presentation to the 2019 IEEE VICS in San Diego
Prepping for the Data Deluge
CIO

Prepping for the Data Deluge

According to a survey of 2,300 global business and IT leaders by MIT Technology Review Insights in association with Pure Storage, nearly 90% of respondents believe data is the key to delivering better results and future growth, especially for shaping a more personalized customer experience.
How to effectively align security with IT
ETCIO

How to effectively align security with IT

Experts believe that CIO and CISO should have clearly defined roles and responsibilities around issues such as how security technologies are selected, how security issues are resolved, and how to handle and escalate disagreements.
5G and What it Means for Cybersecurity
IEEE

5G and What it Means for Cybersecurity

The article from IEEE, through the expert notion from IEEE members, simplifies the idea of 5G and how will it change the cybersecurity scenario.
CrowdStrike tackles BIOS attacks with new Falcon features
TechTarget

CrowdStrike tackles BIOS attacks with new Falcon features

CrowdStrike announced it is enhancing its endpoint security platform, Falcon, to provide organizations with the visibility needed to detect and protect against BIOS attacks.
Why security-IT alignment still fails
CSO Online

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles.
Insider Threats: A Big Fear for Small Businesses
Security Boulevard

Insider Threats: A Big Fear for Small Businesses

Of the things that keep SMB leaders awake at night, insider threats rate at the top. Here’s why this threat is bigger for smaller companies.
6 Questions to Ask While Buying a Connected Car
Dark Reading

6 Questions to Ask While Buying a Connected Car

Here are six questions to keep in mind when you walk into the showroom to buy a networked car.
DHS-led agency works to visualize, share cyber-risk information
TechTarget

DHS-led agency works to visualize, share cyber-risk information

Read about a Department of Homeland Security initiative that proponents say strives to overcome long-standing obstacles to cybersecurity information sharing between the public and private sector.
6 Tips for Conducting a Digital Literacy Assessment
CMSWire

6 Tips for Conducting a Digital Literacy Assessment

The buyer's journey has changed, making digital literacy a must for today's businesses. Here are things to consider when doing a digital literacy assessment.
The Phishing Phenomenon: How To Keep Your Head Above Water
CSHub

The Phishing Phenomenon: How To Keep Your Head Above Water

Even with all the attention phishing scams have received, these cyber attacks are on the rise – and becoming more sophisticated.
Beware the holiday ‘smart toys’ that spy on your kids
The Philadelphia Inquirer

Beware the holiday ‘smart toys’ that spy on your kids

Many new toys are equipped with cameras and are linked to the internet, raising concerns that they are collecting information on children without permission.
Member Spotlight: Kayne McGladrey, Director Of Security And IT, Pensar Development
CSHub

Member Spotlight: Kayne McGladrey, Director Of Security And IT, Pensar Development

Kayne McGladrey is a national cyber security expert helping clients develop proactive risk-based security programs. He's the Director of Security and IT for Pensar Development and has 20+ years of experience, including 10 years in blending information technology and management acumen to cultivate and build best practices within the Professional Services team.
Q&A: Security Thought Leaders Discuss Certs, SMEs & Hiring Process
CSHub

Q&A: Security Thought Leaders Discuss Certs, SMEs & Hiring Process

Security experts and frequent CSHub contributors discuss the hiring process, subject matter experts (SME) and generalists, and the overall state of security.
How Awareness, Attention Can Improve Cyber Security
CSHub

How Awareness, Attention Can Improve Cyber Security

Frequent CSHub contributor Kayne McGladrey describes his Cyber Security Awareness Month experiences with the site, in an effort to drive attention to the entire space.