As someone interested in joining the IT workforce, or someone who is already involved with IT but looking to further their career, cybersecurity - as a specialization - offers a number of benefits and advantages. If you've never considered training in IT security, now is the time to reconsider.
A monster storm is on a collision course with New York City and an evacuation is under way. The streets are clogged, and then it happens. Every traffic light turns red.
Can print magazines survive, thrive and surprise, what with all the existing online, digital and mobile fare? Absolutely, say media industry experts, adding that those who have declared magazines' demise are off-track.
Unethical abuse of communication is not new. The rabbinic scholar, Rabbeinu Gershom, lived a thousand years ago and was considered one of the earliest and greatest scholars of the Ashkenazi Jewish community.
Technology is part of our lives. Now criminals no longer have to break in to steal our valuables, violate our privacy or harm our loved ones. They can and do terrorize us remotely from under the cover of darkness afforded them by the Internet of Things.
For now, consumers are largely on their own when it comes to stopping cybercriminals. You can't rely on over-the-counter antivirus to stop any of the advanced persistent threats and malware that are becoming so commonplace today.
If a nonprofit, like the one described, is attacked, not only will records be compromised, but also the reputation of the agency will be destroyed, probably along with the nonprofit organization itself.
At this week's RSA Conference in San Francisco, the world's leading cyber minds aren't just focusing on international super-hackers and possible future attacks on the electric grid. Do you know what else they're worrying about? Your home.
With winter melting, and spring coming into view, lots of folks are re-emerging and looking to get involved. My team and I generated a list of 5 ways to get involved in tech this spring.
In the 21st century and the post-9/11 global risk environment, we are seeing the emergence of a new type of technology crossover involving national security and the commercial tech market -- or 'cross-convergence.'
The timely and appropriate sharing of information about cyber-security threats, vulnerabilities, lessons learned, and best practices is imperative to building a collaborative framework to defend networks against attacks. This can and should be done in a manner that respectful of privacy.
Many of the industry's top bloggers use social media to inform their followers about a stock and its movement. Social media functions as a way for investors to become aware of a company's news before it becomes stale.
In today's modern frictionless economy, the principal requisite for growth and order is the free flow of sensitive information, banking transactions and private data on a global scale.
This week, the Global Cyberspace Conference takes place in The Hague (16-17 April). In March, UNESCO hosted a conference on Connecting the Dots in Digital Space. The NETmundial Initiative had a meeting in Stanford recently.
Most data is stored by states and businesses. The question of data tracking and reporting by states and business is a current focus of digital policy discussions.
Encryption is becoming a standard item of the journalism toolkit, a must-have for anyone hoping to report on sensitive issues that might upset institutions of power. And it's not just the NSA journalists and sources need to protect themselves from.