CyberSecurity
-
Meet Anomaly Detection: A Powerful Cybersecurity Defense Mechanism When Its Weaknesses Are Addressed
March 9, 2017Anomaly Detection provides great security beneifts — but can also create serious problems. Please view the...
-
Catastrophic Leak: Wikileaks Publishes CIA’s Secret Hacking Tools (Inc.)
March 7, 2017WikiLeaks today published thousands of documents that it claims are from the CIA’s arsenal of hacking...
-
Free Webinar on March 9th – Topic: Advanced Persistent Threats (APTs)
March 7, 2017On March 9th at 1 PM US Eastern I will be discussing protecting yourself (and your...
-
New Cybersecurity Business Report Highlights Geographic Trends (Inc.)
March 2, 2017Last year I wrote about several interesting trends that emerged with the publication of fourth quarter...
-
Massive Internet Outage Caused By Amazon Cloud Glitch (Inc.)
March 2, 2017A glitch at Amazon is causing numerous websites and apps that rely on the company’s Amazon...
-
Inc.: New Report: Businesses Suffer Serious, Measurable Damage From Data Breaches
February 28, 2017Cisco recently published its tenth annual data breach report, and some of the findings should be...
-
Inc.: Why You Can Ignore Calls to Change Your Passwords After Today’s Serious Password Leak Announcement
February 24, 2017A bug in code used by Cloudflare, which provides security and performance services for millions of...
-
Humans: Perhaps The Most Dangerous Element of CyberSecurity
February 22, 2017Think about how much technology has improved in the last decade, 50 years, or even century....
-
Parents Ordered By Government To Destroy Doll That Can Spy On Children and Adults
February 20, 2017Germany’s official regulator of telecommunications has ordered parents to destroy a tech-enhanced doll called My Friend...
-
3 Ways To Protect Your Healthcare Facility From Cyber Disasters
February 20, 2017High-profile cybersecurity disasters targeting healthcare facilities and operations, such as the ransomware attack on Hollywood Presbyterian...