Cybersecurity startups are setting their scopes on a potential goldmine of automated systems they hope will be more effective than hiring human enterprise security teams. There is growing concern across the board that we might be losing control over cybersecurity. The rapid changes in how we use technology to communicate and the increased number of […]

by

The content for the article below is provided by Josh Ray, Vice President for Verisign iDefense. Josh Ray has experience with individuals in the security and cyber threat intelligence (CTI) mission space to create a variety of different capabilities in the public, private and commercial sectors. Ray addresses the the Forrester Research report from November 3, 2015, […]

by

The web portal used by millions of consumers to get health insurance coverage under President Barack Obama’s law logged 316 security incidents in just under 18 months, said a report Wednesday by nonpartisan congressional investigators. The Government Accountability Office said none of the security incidents appeared to have led to the release of sensitive data […]

by

America’s all-in reliance on the Internet comes with benefits but also a serious risk, one that federal prosecutors are detailing in charges against seven Iranian hackers who broke into a string of U.S. banks. Maybe just as troubling is one more target: a small flood control dam outside New York City. … read more at: […]

by

In September 2012, US banking websites started picking up floods of fake traffic. It was a denial-of-service campaign, waged more or less weekly. It went on for month after month, always hitting in the middle of the week, during normal business hours. Under other circumstances, it could have been taken as a hacktivism campaign, akin […]

by

Let’s go back in time by 30 years, and picture a typical business environment: The office is amass with filing cabinets, all full to the brim with documents that have been carefully separated into reams of brown folders. Heavy, thick set typewriters adorn each large dark wood desk. The filing cabinets have impenetrable looking locks […]

by

Nate Couture, Chief Technology Officer of NuHarbor Security and Scott Mosher, Chief Operating Officer, Tuesday, in Burlington.(Photo: KEVIN HURLEY for the FREE PRESS) Justin Fimlaid kept Keurig Green Mountain’s cyber secrets from 2009 to 2013. Then, Fimlaid founded his own firm, NuHarbor Security in Burlington, partly because he was so dissatisfied with the help he tried […]

by

Bank robbery and medical information theft have moved to the Internet, so it is disappointing but not surprising that criminal invasions of personal privacy have followed suit. British pop star Adele just fell victim to a targeted breach of her private pregnancy photos, echoing the theft of hundreds of sensitive celebrity photos in 2014, including […]

by

style=”” class=” js no-touch history csstransforms csstransforms3d csstransitions video” lang=”en”<!– <!– <Attribute name="Caption" value=" After hackers breached a New York dam cyber security system, the TVA ensures its taking a variety of security measures to ensure this doesnt happen in East Tennessee. “/> –>

by