Advertisement
Security
Subscribe to Security

The Lead

Assessing Your Risk For A Cyber Breach & Minimizing The Fallout

January 23, 2015 11:38 am | by Jay Shelton | Articles | Comments

A staggering 43 percent of U.S. companies have experienced a data breach in the last year according to the Ponemon Institute. Despite the rise in breaches, 27 percent of companies didn't have a data breach response plan or team in place.   

China Blocks VPN Services That Skirt Online Censorship

January 23, 2015 9:53 am | by Jack Chang, Associated Press | News | Comments

China is blocking VPN services that let users skirt online censorship of popular websites such...

Malvertising Becomes A Growing Threat

January 21, 2015 12:59 pm | by Jon Minnick, Associate Editor | Videos | Comments

Another computer security threat is spreading and you may have already seen it in action....

5 Tips For Remaining Discreet In The Digital World

January 20, 2015 11:04 am | by Mark Sell | Articles | Comments

Today’s social media age has led consumers to embrace companies that are straightforward and...

View Sample

FREE Email Newsletter

Daily news and top headlines for IT professionals

President Promotes Plans To Improve Cybersecurity

January 15, 2015 12:39 pm | by Jon Minnick, Associate Editor | Videos | Comments

As news of stolen data and cyberattacks becomes an increasing part of our daily lives, President Obama is urging Congress to pass legislation to better protect personal data and put the U.S. on a path to a better cyberdefense.       

Report: Employee Training Can Reduce Cyber Security Risks

January 14, 2015 10:54 am | by Andrew Szal, Digital Reporter, Manufacturing Business Technology | News | Comments

Increased investment in employee training can reduce the risk of a company's cyber security attack by up to 70 percent, according to a new study.                              

Obama Seeks Laws On Data Hacking, Student Privacy

January 12, 2015 10:35 am | by Julie Pace, AP White House Correspondent | News | Comments

President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked.                               

Advertisement

Call On Threat Intelligence To Secure Your Organization

January 7, 2015 12:03 pm | by Jeff Multz | Articles | Comments

You may wish you had a crystal ball to see what cyber threats are headed your way, but there’s something far more reliable. Threat intelligence provides you with true evidence of current-day threats that have already been spotted hitting organizations like yours.

Sony CEO Breaks Silence On Cyberattack

January 6, 2015 1:25 pm | by Brandon Bailey, AP Technology Writer | News | Comments

Sony Corp.'s top corporate executive on Monday condemned the recent hacking assault against its film division, saying his employees were victims of a "vicious and malicious cyberattack."                   

Expert: Not Enough Being Done To Prevent Attack On Critical Infrastructure

December 22, 2014 10:08 am | by International Society of Automation | News | Comments

Inadequate training and a culture of complacency among many owners and operators of critical infrastructure are significantly raising the risks of highly damaging cyberattack throughout the world.               

Sony Hack Adds Security Pressure On Companies

December 19, 2014 10:01 am | by Joe McDonald, AP Business Writer | News | Comments

Faced with rising cybercrime like the attack on Sony Pictures Entertainment, companies worldwide are under pressure to tighten security but are hampered by cost and, for some, reluctance to believe they are in danger.         

Congress Passes Bill To Confront Rising Risks Of Cyberattack

December 19, 2014 9:19 am | by Automation Federation | News | Comments

The United States Congress earlier this week took an important step forward to better protect America from the increasing risks of industrial cyberattack when it approved The Cybersecurity Enhancement Act of 2014.           

Advertisement

5 Challenges To Cybersecurity In The New Year

December 16, 2014 12:49 pm | by Karl Volkman | Articles | Comments

It’s been a tough year for those battling cybersecurity threats and data breaches. From Target and Home Depot to JP Morgan Chase and Sony Pictures Entertainment, 2014 reminded business executives and consumers that nobody is invincible when it comes to cybercrimes.

App Automatically Changes Passwords

December 11, 2014 10:53 am | by USA TODAY | Videos | Comments

Dashlane, the password manager app, introduces a new feature to keep you safer by automatically changing your passwords.                                     

Power Industry Cybersecurity Services For Control System Users

December 10, 2014 10:29 am | by Emerson Process Management | Product Releases | Comments

Emerson Process Management has developed a comprehensive portfolio of cybersecurity services designed to help its Ovation control system customers in the power industry secure their cyber assets and meet compliance regulations. 

Belden To Acquire Tripwire, A Leader In Cybersecurity

December 10, 2014 9:47 am | by Belden Inc. | News | Comments

Belden Inc., a global leader in signal transmission solutions for mission-critical applications, has announced it has signed a definitive agreement to acquire Tripwire for $710 million in cash.                 

The Importance Of Testing IT Readiness And Strong Backup Plans

December 8, 2014 11:39 am | by Chris Cooley | Articles | Comments

Every manufacturer recognizes that its IT network and application infrastructure get more complex every day. At the same time, pressure mounts to make sure that critical IT projects run smoothly, are cost-effective and provide a higher-than-ever ROI. Manufacturers also know that disruptions and outages are inevitable — and they understand the costs when a disaster strikes.

Advertisement

Open-Architecture Key Management Solution

December 3, 2014 10:21 am | by Barcoding, Inc. | Product Releases | Comments

Barcoding, Inc., a leader in enterprise-wide mobility solutions, is now offering an open-architecture Key Management Solution to provide users with greater flexibility and customization options for issuing and collecting keys more quickly and efficiently.

FBI Looking Into Hack Of Sony Computers

December 2, 2014 9:43 am | by Brandon Bailey, AP Technology Writer | News | Comments

The FBI has confirmed it is investigating a recent hacking attack at Sony Pictures Entertainment, which caused major internal computer problems at the film studio last week.                      

Automakers Take Aim At Car Computer Hacks

November 24, 2014 9:51 am | by Justin Pritchard, Associated Press | News | Comments

Tests have revealed vulnerabilities in today's tech-enabled vehicles. Hackers have shown that — given time — they would be able to pop the trunk and start the windshield wipers, cut the brakes or lock them up, and even kill the engine.  

New Robots Patrol For Security In Silicon Valley

November 21, 2014 3:05 pm | by CBS News | Videos | Comments

The new K5 robot features laser scanning and a 360-degree live video camera, but it won't be chasing down the bad guys. It's designed to move around people as it sends images back to a command center.               

Future-Proof Secure Hardware Root Of Trust Technology For IoT Applications

November 21, 2014 9:42 am | by Elliptic Technologies | Product Releases | Comments

Elliptic Technologies, a leading provider of embedded security solutions for the connected world, today unveiled tRoot, its future-proof secure hardware root of trust technology targeting the increasing security challenges in the Internet of Things (IoT).

Feds Say Web Privacy Firm Deceived Consumers

November 18, 2014 9:56 am | by Brandon Bailey, AP Technology Writer | News | Comments

Federal regulators said a respected Internet privacy company gave its seal of approval to commercial websites and mobile apps but failed to check whether they were indeed meeting standards for safeguarding customers' data.        

AT&T Drops 'Super Cookies'

November 17, 2014 9:41 am | by Jack Gillum, Associated Press | News | Comments

AT&T Mobility, the nation's second-largest cellular provider, says it's no longer attaching hidden Internet tracking codes to data transmitted from its users' smartphones. The practice made it nearly impossible to shield its subscribers' identities online.

BlackBerry Expanding Its Mobile-Security Arsenal

November 14, 2014 10:30 am | by The Associated Press | News | Comments

BlackBerry is expanding its efforts to sell mobile-security software on its rivals' smartphones and tablets to help counter the waning popularity of its own devices.                         

Privacy Advantages Of Using A Datacenter In Iceland

November 10, 2014 11:48 am | by Natalie Lehrer | Blogs | Comments

According to most data security analysts, Iceland is often referred to as the most privacy-friendly nation for hosting sensitive data. Because data files are becoming larger, it becomes more practical to host data in one central location where it can be readily accessible from any where in the world.

Cybersecurity Firm IDs New Apple-Targeting Malware

November 6, 2014 10:00 am | by The Associated Press | News | Comments

Palo Alto Networks has discovered a new form of malware that may have affected hundreds of thousands of Apple mobile device users.                                   

Security Contractor Breach Unnoticed For Months

November 4, 2014 1:07 pm | by Stephen Braun, Associated Press | News | Comments

A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official inquiries told The Associated Press.

Walk, Don’t Run: A Security Framework For Midsize Organizations

October 29, 2014 12:08 pm | by Jeff Multz | Articles | Comments

Companies think their network is secure because they bought a product or service, and then they rest. You can’t rest. You need to consistently monitor and analyze your network while investing in training and security updates.        

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading