According to GoodSecurityQuestions.com (yes, there really is a site by that name, the best IT security questions meet five criteria.
He has spent a lot of time addressing the failings of big data systems and pushing for better infrastructure and security protocols across the board. He has even developed a consumer level data platform that mimics what the big guys should be doing.
As we head into the final stretch of 2014, large-scale financial and retail breaches are top-of-mind for many of us, especially as we get ready for holiday shopping. But here is another type of identity theft that all consumers should be aware of and begin to monitor for -- medical identity theft.
Remember that song from 1984, "Somebody's watching me?" It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home...through your computer.
While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be have yet to be determined, but here are some thoughts on probably outcomes.
Co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems The Pentagon has Plan X --a scheme to retaliate against cyber attacks. No one knows...
Last week, The Wall Street Journal detailed the challenges that drug safety authorities like the FDA face when tackling the illegal and unsafe distrib...
While the actual impact of the Novetta report on making U.S. systems more secure from Chinese attacks in the long run will be negligible on the diplomatic front, the recent Axiom revelations will allow the U.S. government to press the Chinese side harder on contentious cybersecurity issues.
What's the biggest worry for Americans? Here's a clue. It's not Ebola, terrorism or spiders. According to two separate studies and polls in just the last two weeks, the two things that most Americans worry about, even fear, are identity theft and hacking.
While cyber attacks on major U.S. corporations like Target and Home Depot garner most of the media coverage on hacking, the reality is, smaller businesses also face significant risks.
The FBI cannot prosecute a case without a victim. If you have been a victim of the anonymous #GamerGate mob, let them know. The National Center for Victims of Crime can help too.
Whether the hackers banked a false sense of security at the institutional level, knowing that the protocols might be deemed an unnecessary expense, or the recent attacks are merely part of the chip card learning curve, this latest technology is only as good as its implementation.
If you are the owner of a business or a freelancer like I am, a lot of your work and information is kept through a variety of internet platforms. Additionally, a lot of your transactions are internet based.
Keanu Reeves recently had a home intruder: a woman. It was 4:00 am when she got into his home and plopped in a chair. The 40-something nut-job told the movie star she was there to meet with him. He nonchalantly called 911. Police took the woman into custody.
Einstein was wrong. World War IV will not be fought with sticks or rocks. It will be fought with bits and bytes, Trojans and bots, APTs and zero-days -- it's already started and we're already losing.