Brian Bohlman

75 Flips | 4 Magazines | 3 Following | 270 Followers | @BrianBohlma2014 | Keep up with Brian Bohlman on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Brian Bohlman”

Massive Postal Service breach hits employees and customers

Hackers recently broke into a U.S. Postal Service computer system and stole personal data, including Social Security numbers, for 750,000 employees and retirees, a U.S. official familiar with the breach told CNN on Monday.<p>The breach also compromised the data of 2.9 million postal service customers, …

5 Ways To Reinforce Your Company's Cybersecurity Program Today

By now, every enterprise should have some form of digital security program in place. In fact, if we were to categorize all enterprises by their security level, they would more likely be split by the relative sophistication of their security risk-management program rather than whether they have one …

Essential security apps for your smartphone and tablet

Hackers would love to weasel their way on to your smartphone or tablet, just like they try to do your computer. That's how they steal sensitive information like account details, passwords, important texts, intimate photos and whatever else possible.<p>Unfortunately for them, mobile gadgets are a bit …

“The Internet of Things is More Than Just “Things” – Five Technology Pillars to Pay Attention To

It has been 15 years since Kevin Ashton popularized the term the Internet of Things. How could we have known then what that would come to mean and the huge impact that it would have on our lives? Cisco projects that 50 Billion things (or devices) will be connected to the Internet by 2020; or, the …

IoE is the Path to Gartner’s ‘All Things Digital’

This week, I had the opportunity to focus on digital business as an attendee and presenter at Gartner’s ITxpo in Orlando, Fla. It was a sold out crowd with 8,500 attendees and approximately 2,700 CIOs. And one insight that seemed to resonate with the audience was Gartner’s belief that by 2018, …

Cisco Systems

Dropbox passwords posted online and millions more might follow

If you haven't activated two-factor authentication on Dropbox yet, you may want to do so now, just in case you end up finding your credentials posted on the internet. A document posted on pastebin earlier contains 400 Dropbox usernames and passwords, which the poster claims are just a tiny fraction …

How to Properly Implement a Secure BYOD Policy in Your Small Business

As technology pushes small businesses toward the use of smartphones and other devices in the workplace, securing your company’s privacy is not an easy task. However, if you follow these simple rules, integral information will not land into the wrong hands. Here are some tips on how to make bring …

Cisco Systems

Report claims Russian hackers spying on NATO, Ukraine

A group of Russian hackers has exploited a flaw in Microsoft's Windows operating system to spy on national security targets, including NATO and the Ukrainian government, according to a report by a cybersecurity firm.<p>The Washington Post reports that research by the cybersecurity firm iSight Partners …

How the 'Internet of Things' will impact consumers, businesses, and governments in 2016 and beyond

For more than two years, BI Intelligence has closely tracked the growth of the IoT. Specifically, we've analyzed how the IoT ecosystem enables entities (i.e. consumers, businesses, and governments) to connect to, and control, their IoT devices in 16 environments, including manufacturing, the …

Meet Anonabox, the tiny WiFi router that can anonymize everything you do online

Users looking to anonymize everything they do online in order to protect their privacy and/or hide from advertisers can always use the Tor browser, …

A Comprehensive Outline of the Security Behind Apple Pay

Apple has described its new Apple Pay payments service, which is designed to be the first step towards the company's goal of replacing the wallet, as "easy, secure, and private." Apple Pay includes several different features that offer customers much greater security than a traditional credit card, …

The Network Admin's Dilemma: Productivity vs Security

The modern network swims in a sea of Wi-Fi and 3G dongle signals. Into it are slotted innumerable USB devices, tablets, telephones, even internet-capable printers. Whilst the necessity of such attachments might be debatable, what isn’t is that network management today is HARD.<p>Managing a corporate …

FBI director blasts Apple and Google for offering encryption

Is it illegal to encrypt the data on your phone? Most would say the answer is a clear no, but Apple's recent announcement that the company won't be able to decrypt user data in iOS 8 apparently has a lot of law enforcement figures spooked. Today at FBI headquarters, director James Comey told …

You Can Create The Perfect Password. Here's How

Are you one of those people who's still using "baseball" or your home address for all your passwords? We shouldn't have to tell you this, but having super simple login information is one of the easiest ways for hackers to get access to everything from your Netflix account to your bank account.<p>We …

Law enforcement is annoyed at the new levels of smartphone encryption

Recently, Apple and Google announced that additional security procedures would be put in place to make it more difficult for law enforcement to retrieve data off a person’s passcode protected smartphone. According to the Wall Street Journal, this has raised alarms inside law enforcement agencies …

Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now Selling Zero-Day Exploits

As a young man, Kevin Mitnick became the world's most notorious black hat hacker, breaking into the networks of companies like IBM, Nokia, Motorola, …

56 million cards compromised at Home Depot

These are not good times for Home Depot. The company’s data breach has a lot of consumers worried about doing business. If you are a customer who …

Home Depot

Demo Thursday: All About Access Points | The Network | The Network

Access points work hard providing connectivity to mobile devices. Ever wondered what's inside? Learn the basics of an access point and how they work on your network.

How to find out if your Google login was compromised in the Gmail hack

Gmail is a fantastic service that has changed the way much of the world uses email. It was also the target of a big security breach recently that has …

Addressing Cyber-Security Challenges of Today and Tomorrow

Did you know that Cisco detects over <b>1.5 million intrusion attempts</b> on Cisco’s network every day? With more than <b>13 billion NetFlow</b> records captured daily, over <b>22 Terabytes</b> of traffic inspected, and <b>750 Gigabyte</b> of system logs collected on a daily basis, it’s changing the landscape for how to secure …

8 Lesser Known, but Very Useful, Apple Mac Utilities

Your Mac comes with a bunch of Apps pre-installed, neatly organized in the Applications folder. You’ve got the iWork suite, AddressBook, iCal and some other useful applications. Also in there is another folder called Utilities.<p>You might have used a few of the applications within it, but there’s …

The Internet of Things will need a whole new breed of chip — here’s what they’ll look like

First connected computers. Then connected devices. Now connected ‘Things’. The technology industry is gearing up for a major transformation, one that may end up having an even greater effect on our lives than the PC and smartphone revolutions.<p>The end uses are exciting — both those we’re …

4 Steps to Ensure IT Security In The Cloud

For companies of all sizes — and increasingly, governments — adopting cloud computing for IT services makes business sense. The cost savings, efficiency, and flexibility are just too impressive to ignore.<p>But, despite the benefits and rising cloud prevalence, some security professionals still have …

Securing Mobile Data in the Event of Device Loss or Theft

<i>As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate</i> …

Cisco Systems

It’s time to get serious about mobile security: Here’s how to protect your Android phone

Unfortunate though it may be, the simple fact is that most of us don’t take mobile security as seriously as we should. The idea of running a PC …

BYOA: a new generation of tools

<i>This sponsored post is produced by K2</i><p>In a hyper-connected world where increased connectivity is the norm, the way we think about productivity has changed. These days, we not only expect people to be constantly accessible, but we have become accustomed to the ability to solve a given problem at a …

Americans don't yet own many smart appliances — but they're about to (report)

The world is getting smarter — not its people, of course, but all those things around us that are getting Net-connected processors. And a recent report from the Acquity Group finds that many Americans will soon be adopting the new smartness.<p>The report, <i>The Internet of Things: The Future of Consumer</i> …

Hackers Using Law Enforcement Tools to Access iCloud Backups Unprotected by Two-Factor Authentication

Earlier today, Apple issued a press release stating that an iCloud/Find My iPhone breach had not been responsible for the leak of several private celebrity photos over the weekend, instead pointing towards a "very targeted attack on user names, passwords, and security questions" hackers used to …