Cybersecurity

 
 
  • Easy Inexpensive Ways to Fight Cyber Attacks

    Cybercrime is evolving fast but there are easy, cost-effective and proven ways to prevent attacks, or at least mitigate the damage they cause. Two factor authentication (2FA) is one of the easiest. It means a user must...

    • Posted 4 weeks ago
    • 0
  • Company Fined $5.7M For Violating Children’s Privacy; Industry Executives Are Warned

    A company that markets video-creation software to children was hit with a record-breaking $5.7 million fine for violation of the Children’s Online Privacy Protection Act (COPPA). The software at issue allows users to make 15 second videos...

    • Posted 1 month ago
    • 0
  • Make Suppression Rules Temporary

    Many security information and event management (SIEM) tools have a machine learning component that falls into the category of Artificial Intelligence. Their sophistication increases as they gather data from machine learning components. Training comes from the user...

    • Posted 1 month ago
    • 0
  • Equifax Report Referenced at Congressional Hearing

    The Senate Committee on Homeland Security and Governmental Affairs has issued a report titled How Equifax Neglected Cybersecurity and Suffered a Devastating Data Breach. It was referenced repeatedly in a March 7 hearing during which Congress members...

    • Posted 1 month ago
    • 0
  • FBI Investigating Contractor For Stealing Walmart Information

    Employees of Compucom, a tech services vendor, are under FBI investigation for possible theft of sensitive information from Walmart. In a court filing, the F.B.I. claims Compucom employees searched internal Walmart correspondence for information that might give...

    • Posted 1 month ago
    • 0
  • SAFETY Act Decreases Private Sector Risk And Liability

    An article co-written by three attorneys who have been deeply involved with homeland security and regulation issues looks at an underutilized strategy for reducing cybersecurity risk and liability. The authors are former Senator Joseph Lieberman; Clarine Nardi...

    • Posted 1 month ago
    • 0
  • cybersecurity attack
    SIEM For Quick Response To Intrusions

    SIEM stands for “security information and event management,” primarily a software/server platform for administrators. The idea is to monitor, manage, and flag events regarding cybersecurity during operation hours. Organized SIEM allows teams and staff to respond quickly...

    • Posted 2 months ago
    • 0
  • Protecting The Corporate Jewels: Digital Forensics In Internal Investigations

    Digital forensics, in particular as applied to internal investigations of potential trade secret theft or improper use of proprietary data, is an area of labyrinthine complexity, but some principles are clear enough. In this article, James Vaughn,...

    • Posted 2 months ago
    • 0
  • Is Code a Form of Free Speech?

    The SEC recently charged Zachary Coburn, co-founder of decentralized cryptocurrency exchange EtherDelta, with running an unregistered national securities exchange. He settled and agreed to pay over $300,000. In the cease and desist order issued in connection with...

    • Posted 2 months ago
    • 0
  • A Primer On Cloud Security

    A blog post on the threat stack site provides some guidance on what some broad categories of cloud security solutions do and don’t offer, and how they deliver security information and alerts to their end users. Network...

    • Posted 2 months ago
    • 0