Cybersecurity

Cybersecurity news, analysis, how-to, opinion and video. | CIO

credit card fraud
ransomware data laptop

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Healthcare firms plan to increase security spending

After several high-profile breaches over the past couple of years, the healthcare industry plans to increase its spending on IT security more than other sectors.

1 recovering days

Why DRaaS is a better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.

The Internal Revenue Service's IRS tax filing form 1040.

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits

1 oscar intro

And the Oscar goes to… Cybersecurity!

Imagine if the Oscars’ categories applied to cybersecurity.

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

artificial intelligence ai a.i.

AI faces hype, skepticism at RSA cybersecurity show

The cybersecurity industry has been talking up artificial intelligence and machine learning as a way to stop the hackers, but don’t necessarily believe all the hype.

170214 hagerman

Sophos CEO sounds the alarm on enterprise ransomware attacks

Ransomware is increasingly becoming a problem for companies, and the CEO of a leading computer security company says he fears 2017 could see entire companies shut down until they pay up, or risk losing all their data.

binary code cityscape speed

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

brad smith 2014 1134x1200

Microsoft's president wants a Geneva Convention for cyberwar

Microsoft is calling for a “Digital Geneva Convention,” as global tensions over digital attacks continue to rise. The tech giant wants to see civilian use of the internet protected as part of an international set of accords, Brad...

ibm

IBM’s Watson teams up with its SIEM platform for smarter, faster event detection

IBM’s Watson supercomputer can now consult with the company’s security information and event management (SIEM) platform to deliver well researched responses to security events and do so much faster than a person.

01 worms

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users.

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

ransomware hardware security embedded circuit board integrated controller

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.

man with online security key

Tighten security with better software development

Security threats and security solutions both depend on software. One way to safeguard your systems and data is to take a secure approach to software development that focuses on quality assurance, testing and code review.

gary hayslip san diego 1

How San Diego fights off 500,000 cyberattacks a day

San Diego has a huge range of technologies to support and secure, from legacy apps to smart city devices. Learn how the city’s security team is eliminating blind spots, prioritizing threats, and reducing exposure and loss.

cyber hand

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S....

twitter things that bother us

Why Twitter's new anti-harassment tools will fail

Twitter's new policies won't solve the harassment problem, and they'll ruin engagement, too.

Load More