Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Monthly Archives: November 2014
Big Data will Revolutionize Cyber Security
Organizations are increasingly exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change by supplying intelligence-driven models. Research firm Gartner says that big data analytics will … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Big Data will Revolutionize Cyber Security
70% of US energy companies expect a cybersecurity attack in the next year
Energy companies in the US were hacked 79 times last year according to a survey by ThreatTrack Security. The survey found that 35% of respondents reported endpoints on their network had been infected by malware that evaded their defenses during … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on 70% of US energy companies expect a cybersecurity attack in the next year
The language of deception…
We hear anywhere from 10 to 200 lies a day. And although we’ve spent much of our history coming up with ways to detect these lies by tracking physiological changes in their tellers, these methods have proved unreliable. Is there … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on The language of deception…
Survey: Cybersecurity priorities shift to insider threats
A survey of federal IT managers commissioned by the Fort Meade Alliance in both the civilian and defense sectors showed a shift in cybersecurity concerns – from outside actors to insider threats and a focus on the need to educate … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on Survey: Cybersecurity priorities shift to insider threats
In cybersecurity, the weakest link is YOU…
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted … Continue reading
Posted in Cybersecurity Memo - Insiders Edition
Comments Off on In cybersecurity, the weakest link is YOU…