While it is disconcerting that there isn't a more robust incident response culture out there, perhaps more worrisome is the seeming lack of best practices pointed at heading off the problem before it happens. That's where a new term comes into play.
Digital parents are active partners in their child's digital life and must set an example for smart Internet use. Apart from teaching computer skills to children, the digital parent is best suited to guide the child on issues of online safety, and digital citizenship.
Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.
Embarrassing emails from Sony executives and Hollywood celebrities got the headlines and the jeering tweets, but the hack, reportedly coming from North Korea, was a devastating cyber-takedown of the $20 billion company.
Just because it's hard to understand how cloud computing works, many managers feel paranoid about cloud safety. Ease their minds by debunking three of the most pervasive cloud security myths.
Individuals, Companies, Governments and Brands need to pay careful attention to the correlation between search, social media and reputation control and management. If it is left to the Internet, you will not be happy with the results.
In the past few years more than 80 innovative startup companies as of April 2015 have been valued at more than $1 billion. With the most innovative and those with the most potential reaching well beyond this mark.
As someone interested in joining the IT workforce, or someone who is already involved with IT but looking to further their career, cybersecurity - as a specialization - offers a number of benefits and advantages. If you've never considered training in IT security, now is the time to reconsider.
A monster storm is on a collision course with New York City and an evacuation is under way. The streets are clogged, and then it happens. Every traffic light turns red.
Can print magazines survive, thrive and surprise, what with all the existing online, digital and mobile fare? Absolutely, say media industry experts, adding that those who have declared magazines' demise are off-track.
Unethical abuse of communication is not new. The rabbinic scholar, Rabbeinu Gershom, lived a thousand years ago and was considered one of the earliest and greatest scholars of the Ashkenazi Jewish community.
Technology is part of our lives. Now criminals no longer have to break in to steal our valuables, violate our privacy or harm our loved ones. They can and do terrorize us remotely from under the cover of darkness afforded them by the Internet of Things.
For now, consumers are largely on their own when it comes to stopping cybercriminals. You can't rely on over-the-counter antivirus to stop any of the advanced persistent threats and malware that are becoming so commonplace today.
If a nonprofit, like the one described, is attacked, not only will records be compromised, but also the reputation of the agency will be destroyed, probably along with the nonprofit organization itself.
At this week's RSA Conference in San Francisco, the world's leading cyber minds aren't just focusing on international super-hackers and possible future attacks on the electric grid. Do you know what else they're worrying about? Your home.
With winter melting, and spring coming into view, lots of folks are re-emerging and looking to get involved. My team and I generated a list of 5 ways to get involved in tech this spring.