Cybersecurity

 
 
  • How An IoT Hack Could Bring Down The Grid

    There’s been much speculation about the kind of hacking that will come with the Internet of Things. Now some research at Princeton University is looking at a possible scenario, one the researchers say is worth the effort...

    • Posted 10 hours ago
    • 0
  • Detecting Zero Day

    Zero-day malware attacks have foiled cybersecurity experts because such malware is devised to evade certain techniques they’ve come to rely upon. According to Check Point Threat Intelligence, unknown malware attacks are capable of bypassing an organization’s spam...

    • Posted 10 hours ago
    • 0
  • Three State Attorneys General Investigating Marriot

    Personal information about hundreds of millions of guests was compromised by the data breach at Marriot International, which took place over four years before being detected earlier this month. Hackers accessed gender, birth dates, email and mailing...

    • Posted 4 days ago
    • 0
  • A Guide To CA’s New Cybersecurity Laws

    California, has passed a number of internet and cybersecurity laws. This post from cybersecurity company SiteLock looks at the new net neutrality law, the privacy law, and the Internet of Things law, which was passed in August...

    • Posted 1 week ago
    • 0
  • Cybersecurity Risk With Seasonal Workers

    For many businesses, this is the season for rapid short-term hiring. There are risks that come with a hiring surge, and this post from RSA Security suggests some practices that will minimize that risk. Seasonal workers must...

    • Posted 1 week ago
    • 0
  • Security Best Practices That Stand the Test of Time

    The common wisdom says that hackers are eternally one step ahead of security. Nevertheless, a few best practices from way back when still work. Network security professional a few decades ago spent a lot of time monitoring...

    • Posted 2 weeks ago
    • 0
  • Who Is Reading Your Email Exchanges With Your Client?

    The vast majority of attorneys, more than 90 percent, routinely send confidential information over email, most frequently over Gmail. These are subject to all the hacks, leaks, and security breaches that non- attorneys experience, with the additional...

    • Posted 2 weeks ago
    • 0
  • Cybersecurity Primer From The Horse’s Mouth

    A global risk management company interviews its own chief information security officer for an inside take on the essentials of enterprise cybersecurity. Among the topics discussed are the ins-and-outs of hiring black-hat hackers, how the CISO’s understanding...

    • Posted 3 weeks ago
    • 0
  • Know Industry Compliance Standards Before Employing Container Security

    More companies are focusing on container security to ensure that they don’t ship software with known vulnerabilities, to protect sensitive data, and to maintain compliance with industry-specific regulations such as HIPAA, PCI, or SOC 2. In theory,...

    • Posted 3 weeks ago
    • 0
  • New Patent Heightens Privacy Concerns

    As of this month Amazon has a patent that arms Alexa with a voice analyzer capable of revealing characteristics such as emotional state, ethnicity and age, based on accent. Combined with already functional properties that determine location,...

    • Posted 3 weeks ago
    • 0