Archive for the ‘cybersecurity’ Category
Major data breaches and cyber attacks are occurring at an alarming rate, and if you are still not using a VPN and password manager app, you are seriously out of excuses.
Not just VPN software and a password manager, cybersecurity experts also recommend using antivirus and backup solutions to protect your computers and precious data stored on them. Unfortunately, to cover these bases, one
Posted in Best Antivirus, best password manager, best vpn service, cyber security software, cybersecurity, cybersecurity apps, Online Security, password manager, secure vpn service | Comments (0)
Google's one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats.
Network infrastructures at most enterprises regularly generate enormous amounts of network
Posted in Backstory threat analytics, Chronicle, cyber security software, cybersecurity, Enterprise Security, Google Backstory, Google Cloud, network security, SIEM Software | Comments (0)
If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to be targeted. Well, think again.
While the major headlines tend to focus on large enterprises getting breached – such as Sony, Equifax, or Target the actual reality is that small and mid-sized companies are experiencing similar threats.
According to Verizon’s 2018 Data
Posted in Cyber Attack, cyber security, cyber security videos, cyber security webinar, cybersecurity, Enterprise Security, hacking news, webinar | Comments (0)
In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber security has only become more complex.
Today, controls dramatically outnumber staff available to support them. The Bank of America has a $400-million cyber budget to hire security staff and implement a broad array of products.
But what if your budget and
Posted in cyber security, cyber security policy, cyber security software, cyber security tools, cybersecurity, cybersecurity framework, Cynet, incident response tool, network security auditor, network security tool | Comments (0)
Our partner Springboard, which provides online courses to help you advance your cybersecurity career with personalized mentorship from industry experts, recently researched current cybersecurity salaries and future earning potential in order to trace a path to how much money you can make.
Here's what they found were the most important factors for making sure you earn as much as possible:
Posted in cyber security, cyber security career, Cyber Security Certifications, cyber security degree, cyber security jobs salary, cyber security training, cybersecurity, cybersecurity jobs, cybersecurity salary | Comments (0)
Cybersecurity researchers at Check Point today revealed details of a potential dangerous vulnerability in DJI Drone web app that could have allowed attackers access user accounts and synced sensitive information within it, including flight records, location, live video camera feed, and photos taken during a flight.
Thought the vulnerability was discovered and responsibly reported by the
Posted in cybersecurity, DJI Drone, DJI Mavic Pro Drone, DJI Phantom Drone, hacking news, Vulnerability | Comments (0)
You might have read somewhere online today that Google is granting Android app developers powers to forcefully install app updates…but it is not true.
Instead, the tech giant is providing a new feature that will help users to have up-to-date Android apps all the time and yes, it's optional.
Along with the launch of a number of new tools and features at its Android Dev Summit 2018, Google has
Posted in Android, Android API, android app developer, android app development, Android app update, Android Update, cybersecurity, In-app updates API, Mobile Security | Comments (0)
We all have something to hide, something to protect. But if you are also relying on self-encrypting drives for that, then you should read this news carefully.
Security researchers have discovered multiple critical vulnerabilities in some of the popular self-encrypting solid state drives (SSD) that could allow an attacker to decrypt disk encryption and recover protected data without knowing
Posted in cybersecurity, disk encryption software, Full Disk Encryption, Hard Drive Data Recovery, hardware encryption, hardware hacking, Self-Encrypting SSD, software encryption, solid state drives, SSD, Vulnerability | Comments (0)
Joshua Adam Schulte, a 30-year-old former CIA computer programmer who was indicted over four months ago for masterminding the largest leak of classified information in the agency's history, has now been issued three new charges.
The news comes just hours after Schulte wrote a letter to the federal judge presiding over his case, accusing officials at Manhattan Metropolitan Correctional Center of
Posted in CIA, CIA Hacker, Cyber Crime, cybersecurity, insider threat, Joshua Adam Schulte, Vault 7, Whistleblower, WikiLeaks | Comments (0)