Internet of Things

DC

The Only Problem With the New IoT Cybersecurity Bill

By | Aug 4, 2017 at 2:30 pm

Sen. Mark Warner, a Virginian Democrat, and Sen. Cory Gardner, a Republican from Colorado, have teamed up on a cyber-security bill aimed at what — for Congress, at least — is an entirely new problem. The bill focuses on the Internet of Things, or…

Security

4 Innovations in Personal Authentication Technology

By | Jul 22, 2017 at 10:30 am

There is no such thing as a strong password. In fact, just by brute force, many hackers can crack a password in less than an hour. Get a machine involved, and it can iterate through millions of potential passwords until it finds the right…

Security

4 Tech Roadblocks That Are Holding Marketers Back

By | Jul 21, 2017 at 2:30 pm

Small and midsize businesses have a tech problem: Since they don’t have the resources and capital available to larger companies, they can’t easily plug up security holes, extrapolate from the data available to them, or navigate their communication systems as easily. Tech roadblocks that other…

Security

So Is the New Ransomware Attack Petya or NotPetya?

By | Jun 29, 2017 at 2:30 pm

Yesterday we reported on the latest ransomware attack, calling it “Petya.” But plenty of experts and news sources reported the attack under a name that literally could not be more opposite: “NotPetya.” So what’s the distinction? Why is a cyberattack so difficult to identify…

Security

Seattle

What You Need to Know About the Petya Ransomware Attack

By | Jun 28, 2017 at 3:50 pm

Cybersecurity concerns, true to most experts’ warnings, have appeared to increase over the last few years. This week, another wave of attacks swept the globe, indicating that the problem is continuing to get worse. Dubbed Petya, the attacks affected 65 countries and were traced…

Startup_Mixology_300x250

Security

Here’s What to Do About Cybersecurity’s Gender Gap Problem

By | Jun 27, 2017 at 10:50 am

The security sector is a male-dominated industry: Right now, just 11 percent of the world’s information security workforce are women, while at the same time, more than 200,000 U.S. security positions remain unfilled. Could boosting the profiles of current female security professionals help by changing…

Security

18 Science Fiction Movies That Used Biometrics

By | Jun 23, 2017 at 8:30 am

Decades ago, the concept of facial and voice recognition and retinal scanners was only for the Starship Enterprise. Today biometrics, a term used to refer to metrics related to human characteristics, have become an everyday usage for anyone with an advanced smartphone to access control and identification…

Security

Chicago

Software M&A Has a Cybersecurity Problem That’s Only Getting Worse

By | Jun 20, 2017 at 10:50 am

Yesterday, news broke of likely the biggest government data breach in the history of the universe. Today, we bring you the latest cybersecurity study, which reveals that although the majority of software mergers and acquisitions are plagued by security concerns, most corporations still plan to…

Security

Personal Data of 198M US Voters Has Leaked in Largest Ever Voting Breach

By | Jun 19, 2017 at 2:30 pm

Political data breaches aren’t just for the DNC anymore: A GOP data firm has accidentally leaked personal information on almost all of the 200 million registered voters it had access to. The database was left exposed to the internet on a publicly accessible Amazon server. The…

Security

4 Free Cybersecurity Tools for Startups

By | Jun 17, 2017 at 12:45 pm

Investing in online security remains a key challenge for startup owners. After all, 71 percent of cyber attacks target small businesses, and those affected go out of business within six months of the attack. Unfortunately, the majority of available solutions cost a lot. On…

Internet of Things

In the Future, Internet-Connected Car Security Is Only Getting Tougher

By | May 25, 2017 at 9:15 am

The rapidly developing world of self-driving cars will create an entirely new form of life in major cities across the world: Cars will be able to interact with each other and with their surroundings, creating massive amounts of data that can help solve traffic problems or, analyzed…

Security

3 Cybersecurity Practices That Small Businesses Need to Consider Now

By | May 20, 2017 at 2:30 pm

All businesses, regardless of size, are susceptible to a cyberattack. Anyone associated with a company, from executive to customer, can be a potential target. The hacking threat is particularly dangerous to small businesses who may not have the resources to protect against an attack let alone ransomware….

Security

5 Ways to Secure Your Email Conversations

By | May 1, 2017 at 9:15 am

As mobility and accessibility increases, so does the emergence of new security threats that seek to steal your most confidential information. Since businesses communicate primarily through email, it’s important to always keep your system updated with the latest security software. You need to be…

Security

7 Ways a VPN Can Help Protect Your Identity

By | Apr 5, 2017 at 8:30 pm

While many people are familiar with a VPN, many choose to not use it on a regular basis. However, with the rise in cyberthreats, it would be good to consider using one in the future as you surf the internet and boost your security….