Cybersecurity

Guy in Charge of All the Nukes: Relax, I'm Not Gonna Let Trump Nuke Just Anything

The U.S. military’s stockpile of nuclear weapons is one of the most existentially terrifying arsenals ever assembled, and a conflict involving the …

Security

The Argentine Navy Is Missing an Attack Submarine With 44 Crew on Board

The ARA San Juan, a Argentine Navy diesel-electric attack submarine built in 1983, has been missing since November 15th with a crew of 44 sailors on …

Electric Vehicles

The Essentials of Cyber Insurance: A Panel of Industry Experts

Patrick Florer (Risk Centric Security, Inc.), Mark Knepshield (McGriff, Seibels & Williams), and John Southrey (Texas Medical Liability Trust) are cyber insurance industry experts who have been working in the industry for longer than most of the newly-minted experts have even known about cyber …

Security

Pentagon Cache of Over 1.8 Billion Scraped Social Media Posts Left Unsecured on Amazon Server

The Pentagon accidentally left at least 1.8 billion publicly accessible posts it scraped from social media sites, forums and other web destinations …

Security

2 Signs Palo Alto Networks Inc Needs New Management

An unfulfilled promise and ongoing losses mean it’s time the data security provider consider some tough choices.<p>Though its stock price is up 11% year …

Stocks

How This Millennial Went From A High School Dropout To Cyber Security Expert

New technologies, like the cloud, constantly put the safe-keeping of our personal information at risk. Take the Equifax breach that put 142 million consumers’ personal information in jeopardy for example – danger can potentially lurk around every corner of the internet, yet many companies still …

Education

Amazon Cloud Cam Review Roundup: What Critics Love and Hate

Amazon's Cloud Cam ($119) is the first home-security device from the company, offering users the opportunity to see what's happening in a room, …

Home Automation

Make Cybersecurity About Innovation and Growth

Cybersecurity doesn't have to be just a cost of doing business. With the right approach, it can both protect while creating new levels of business …

Security

North Korea hacks, Anonymous strikes and Russia trolls: The week in cybersecurity

The best cybersecurity stories of the week from the IBTimes UK tech team.<p>This week in the world of cybersecurity the UK was reeling from revelations …

Security

Beware of the Bots in the Process of Digital Transformation

Did you actually think that Bots are smart? <b></b>If so, you are wrong. They are super smart and can be maliciously intelligent at times, as well. Bots can …

DevOps

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

Jake Williams awoke last April in an Orlando, Fla., hotel where he was leading a training session. Checking Twitter, Mr. Williams, a cybersecurity …

Middle East

Insider Threats: Red Flags and Best Practices

Security pros list red flags indicating an insider attack and best practices to protect against accidental and malicious exposure.<p>1 of 7<p><i>(Image:</i> …

Information Security

Tom Standage

<b>Tom Standage</b><p>is deputy editor of <i>The Economist</i><p>@tomstandage<p>More <b>contributors</b><p>Rewind<p>The crooked timber of humanity<p>Nearly two centuries ago, France was hit …

Cyber-attacks

ICT company Chess rebrands Great Barton firm Foursys to cement their complementary roles

A Bury based IT security company has been rebranded following its acquisition by telecoms and ICT provider Chess.

Manchester

Global Endpoint Detection and Response Market Growth 8.64% by 2021- Industry Analysis, Size, Share, Opportunities, Key Vendors, Drivers and Forecast

<b>Endpoint Detection and Response</b> <b>Market</b> report delivers information about <b>vendors, geographical regions, annual growth rate, market share, revenue</b> and …

Security

Forget Election Tampering. This Is the Real Threat From Russian Hackers

World War III has already begun. Russian hackers are attacking infrastructure, and it matters.<p>All eyes are on Russia's elections meddling and rightfully so. Yet a related Russian affairs controversy has been unfolding on a parallel track that hasn't gotten anywhere near the public scrutiny it …

Security

Entry Level Cybersecurity Jobs Paying More than Entry Level Lawyers

November 17, 2017 | by Heather MacLean<p>Blog<p>While this headline might be salacious to some, it’s reality. By 2021 there will be a global shortage of …

Security

Could Terrorists Hack an Airplane? The Government Just Did.

Hacking experts having been warning for years that it’s too easy to breach a cockpit’s defenses. Now an alarming government test proves their …

Security

The NSA Is Hacked...Again

So uh, the NSA was hacked. Again. It’s a bit disconcerting, to say the least, that our country’s hackers keep getting hacked. The folks who are are …

National Security Agency (NSA)

Watch This Cyber Security Company Hack Amazon Key With Ease

Earlier this month, Amazon announced a new idea that would stop those pesky sidewalk thieves from stealing your packages: Amazon Key. The innovative …

Security

U.S. Flagged Russian Firm Kaspersky as Potential Threat as Early as 2004

Intelligence agencies have expressed concern about the cybersecurity company’s software<p>WASHINGTON—A Russian cybersecurity firm whose products current and former U.S. officials suspect Moscow has used as a tool for spying was flagged by U.S. military intelligence as a potential security threat as …

Kaspersky Lab

SailPoint IPO jumps more than 20% as companies focus on cybersecurity

SailPoint Technologies is riding a wave of interest in cybersecurity. The company priced its initial public offering at the NYSE at $12, well above …

Security

British spies using controversial security company run by a former KGB-trained intelligence expert

British spies have been using a controversial security company, which is run by a former KGB-trained intelligence expert, to help warn the public about cyber and hacking attacks.<p>GCHQ, the UK's frontline in cyber defence, has five times in the last year published "threat alerts" based on the …

Technology

Global ransomware damage costs predicted to exceed $11.5 billion annually by 2019

Ransomware has reached epidemic proportions globally according to a report by Cybersecurity Ventures which revealed that damage costs are predicted …

Security

German Regulators Ban Smartwatches for Kids, Urge Parents to Destroy Them

Saying the technology more closely resembles a “spying device” than a toy, Germany regulators have banned the sale of smartwatches designed for kids, …

Security

Startup Spotlight: Cyber Security, Car Care, and Reducing Grunt Work

With the new iPhone X, biometric security was taken to the next level with FaceID to protect one’s personal and banking information. Each week, …

Security

A Cybersecurity Carol: Key Takaways From This Year's Most Hackable Holiday Gifts

A classic holiday story is <i>A Christmas Carol</i> by Charles Dickens, which tells the tale of how a grumpy man learns from his mistakes, as guided by the Ghosts of Christmas Past, Present and Future. Funny enough, our most Hackable Gifts Campaign resembles this tale, as there are lessons we've learned …

AOL

Government Outlines When It Will Disclose Or Exploit Software Vulnerabilities

Government agencies that deal with cybersecurity, like the National Security Agency, have two competing interests. On the one hand, they want to protect America's online infrastructure and economy from cyberattacks. On the other hand, government agencies want to harness tools to attack opponents in …

News (U.S.)

UK seeks future cyber-security stars

<b>A £20m initiative to get schoolchildren interested in cyber-security has been launched by the UK government.</b><p>The Cyber Discovery programme is aimed at 15 to 18-year-olds and involves online and offline challenges themed around battling hackers.<p>It is one of several programmes trying to build interest …

Technology

White House Unveils New Rules on Divulging IT Security Flaws

A report on new White House rules on when to disclose cybersecurity vulnerabilities to software vendors leads the latest edition of the ISMG Security …

Security