Cyberterrorism

Cyberterrorism news, analysis, research, how-to, opinion, and video.

hacker hack attacke cyber malware keyboard
8 small business security

data breach

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.

fail stamp

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

security thinkstock

How you can be the smartest cybersecurity expert in the room

Information security is the hottest topic of 2017 with billions of dollars in investments planned. Yet few people have even a basic understanding of the key principles.

Cyber security breach attack on monitor with binary code

How to navigate the changing landscape of cybersecurity

The world of cybersecurity has changed drastically over the past couple of decades. We have evolved from a world of keystroke logging and trojans to a universe of full fledged ransomware and cyber warfare.

fbi primary3

FBI chief calls for private sector to help battle cybercrime

As the FBI has been expanding and retooling its approach to cyber investigations, Director James Comey stresses need for CISOs to engage with the bureau.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

brad smith 2014 1134x1200

Microsoft's president wants a Geneva Convention for cyberwar

Microsoft is calling for a “Digital Geneva Convention,” as global tensions over digital attacks continue to rise. The tech giant wants to see civilian use of the internet protected as part of an international set of accords, Brad...

combat cyber crime ts

How Facebook and Google are battling internet terrorism

Leading platform providers are exploring new ways to actively engage in counter-messaging, building on robust systems to flag and remove extremist content.

fbi dhs

DHS should have a cybersecurity unit, says panel chairman

The chairman of the U.S. House Committee on Homeland Security said his top priority in 2017 will be to push for creation of a cybersecurity agency within the Department of Homeland Security.

Tom Ridge

Former DHS head urges Trump to see economic dangers from cyberattacks

Last week's U.S. intelligence report tracing Russia's cyber-meddling with the 2016 presidential election is a timely reminder of the cybersecurity risks that the government and private companies face, said Tom Ridge, the nation's...

cybersecurity budgets

Corporate boards aren't prepared for cyberattacks

CEOs, board members need to bone up on cybersecurity and not leave those matters to CIOs, analyst says

cloud building security

Top 4 security trends of 2016

As digital transformation overtook the enterprise in 2016, security professionals have struggled to keep up with a shifting technology and cultural landscape while keeping one eye ahead on the threat horizon.

malware attack cyberespionage code hacker

Cyberattack suspected in Ukraine power outage

A new power outage that affected parts of Kiev and the surrounding region in Ukraine late Saturday might have been the result of a cyberattack.

padlock unlocked security hole flaw

2017 security predictions

If you thought 2016 was bad, fasten your seat belts -- next year is going to be even worse.

cybersecurity budgets

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?

01 newregs

Breaking down New York’s new cyber regulations

Ajay Arora, CEO & Co-founder of data security startup Vera, shares insight on navigating the New York's newest set of cybersecurity regulations to help firms adopt a security strategy that scales in the face of future cybersecurity...

internet of things graphic

It’s time to regulate baby monitors

The internet can survive nuclear war, but not toasters and smart TVs. Government needs to act on the dangers of the IoT now.

Load More