Data analytics, big data, business, chart, laptop

harvard university

Deferring Harvard for a cybersecurity start-up

Why the gap year is fruitful for students and great for the enterprise

Firefighters

Cybersecurity recruitment in crisis

Globally cybersecurity is in crisis not solely from a lack of skilled personnel, but also from a lack of strategic direction and company’s inability to hire staff in an expedient, effective and efficient manner.

video

Arduino targets IOT devices with Primo, Otto boards

Arduino has launched two new boards that integrate wireless networking and target developers building devices for the Internet of Things

nyse stock trading

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. The SEC promises to step up regulation and Swift itself is expected to launch a new cyber...

spoofing 1

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps.

apple campus headquarters stock

Apple hires mobile encryption pioneer amid encryption debate

Apple revealed Tuesday that it rehired a security expert who has a background as a mobile encryption pioneer, as the company continues to face scrutiny from governments wanting more access to its products.

Internal Revenue Service IRS tax filing form 1040

Five arrested for impersonating the IRS, listen to a recorded scam in progress

Five people have been arrested in Miami who are said to be responsible for scamming 1,500 people out of more than $2 million by impersonating IRS agents. Their scams centered on contacting individual taxpayers out of the blue and...

video

Hardcore Hardware: The Nvidia GeForce GTX 1080 is irresponsibly fast

Seven point two billion transistors. State-of-the-art 16nm process. And nothing but absolutely pure bad-assery.

intel computestick

76% off Intel Compute Stick - Deal Alert

The Intel Compute Stick is a tiny device the size of a pack of gum that can transform any HDMI TV or display into a complete computer. It's regular list price of $490 on Amazon has been dramatically reduced to just $115.90.

teamwork

Do we need vendor allies in the malware arms race?

The complexity of today’s SOC functions means you probably can’t hire and keep a staff with all the necessary training.

disaster recovery plan ts

Disaster recovery in a DevOps world

Organizations that are adopting DevOps methodologies are realizing actual benefits from taking that approach.

massachusetts state house

US state officials worry about their ability to respond to cyberattacks

Many U.S. states aren't confident in their ability to respond to cyberattacks on physical infrastructure such as water and electric systems, some emergency response officials said.

insider threats

By the numbers: Cyber attack costs compared

Not all cyber attacks are created equal. Here's an at-a-glance look at what are the most expensive cyber attacks, how costs are distributed, and where organizations are putting their money.

t 34 rocket launcher france

New DMA Locker ransomware is ramping up for widespread attacks

A new ransomware program called DMA Locker has reached maturity and shows signs of being distributed in widespread attacks.

managed security service providers

Security training programs don't do enough to mitigate insider risk

The threats posed by negligent insiders top many security professionals' lists of security concerns, but even organizations that have data protection and privacy training programs aren't getting through to their employees.

video

Instagram's redesign: Why do we hate it?

From Uber to Instagram, the surprising reason why we freak out every time an app gets a new redesign.

00 phishing money hook

How to avoid phishing attacks

Eyal Benishti, CEO of IronScales, provides some best practices to raise employee awareness and mitigate phishing risks. Remember, cyber criminals are lazy. If your organization is a tough nut to crack, they will move on to find more...

Trainerbot play
video

This ping pong robot can be programmed to be the perfect partner

The Trainerbot is a smart ping pong robot that aims to take your skills to the next level.

Load More