The deputy director of the New Jersey Office of Homeland Security and Preparedness, Steve Gutkin, explains how building strategic public and private partnerships can help protect a country’s critical infrastructure and offers pointers on nurturing such alliances.
State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their relationship. They stressed that communication between their roles is vital to prioritizing cybersecurity efforts.
Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service.
In addition, the company is bringing its Azure Stream Analytics to edge devices, making it easier to provision new IoT devices, and it’s launching a completely new analytics service for time series data.
When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don’t always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today.
While employees don’t want their companies to fall victim to a security breach, they also prefer to avoid security policies that limit their workplace productivity and daily activities, the survey found.
Two years ago, Charlie Miller and Chris Valasek pulled off a demonstration that shook the auto industry, remotely hacking a Jeep Cherokee via its internet connection to paralyze it on a highway. Since then, the two security researchers have been quietly working for Uber, helping the startup secure its experimental self-driving cars against exactly the sort of attack they proved was possible on a traditional one.
While most of tax scams have been aimed at individual taxpayers, there are some new scams aimed at businesses that will try to approach your employees.
It was a fairly typical Wednesday afternoon, meaning that I was trying to decide what I’d write about for the second column of the week, when the phone rang. A recorded voice on the other end said that the calling organization could prevent criminal charges and collection activities because of my business’ tax problems. All I had to do was press 1.
President Trump signed congressional legislation Monday night that repeals the Federal Communications Commission’s privacy protections for Internet users, rolling back a landmark policy from the Obama era and enabling Internet providers to compete with Google and Facebook in the online ad market.
We live in a cyber-vulnerable world – a world governed by data. Data encapsulates almost every aspect of our personal and public life. It is heavily shared, distributed, stored and accessed, and it is constantly at risk. Recent mega-hacks, such as the ones on Target, Yahoo, and Ashley Madison, among others, demonstrate that leaking of personal information and misuse of our data are inevitable in a world that is becoming increasingly more connected and data-centric.
Whether you see Bitcoin as the key to a free, utopian form of economy, or as a regulation-free mystery of the digital age, it has, to this point, thrived outside of the standard rules that dictate how finance traditionally functions. Blockchain, the technology that has enabled Bitcoin to remain a maverick of the fintech industry, exists on fundamental security systems that make traditional regulators unnecessary. But blockchain, and by extension Bitcoin, may not live outside of the reach of financial regulators for much longer.
Some security professionals apparently find it tough to maintain safe password practices outside of work, with 53% percent acknowledging that they either haven’t changed their social network passwords in more than a year – or at all, according to a report released today by security firm Thycotic.