Cybersecurity

Cybersecurity news, analysis, how-to, opinion and video. | CIO


sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

woman leader strong collaboration multi cultural diversity

Diversity and competency are not mutually exclusive

Emphasizing diversity does not mean you’re lowering your standards.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

outsourcing ts

Cybersecurity considerations for outsourcing software development

When it comes to outsourcing software development, you can never be too careful. Be sure to take thoughtful steps to protect your information assets, and protect the productivity gains that you realize through outsourcing. Learn how...

robots pc computers army desks work

Bandwidth as a service: The End of DDoS?

Blockchain-oriented firms have started to tackle the twin problems of website security and communication speeds. Thanks to its decentralized and heavily encrypted design, blockchain is ideally suited for protection.

dark web hacker tablet malware

Widespread cybercrime costs reaching $11.7 million on average per organization

Overall, breaches have increased by 23 percent over the previous year, and demand a security approach that builds resilience from the inside out.

intro cyber attack maps

Fighting malware with P2P cyber protection

As new systems such as blockchain and P2P networks gain more widespread acceptance, the ways we deal with cybersecurity and malware attacks could evolve radically.

cyber attack virus meltdown

6 reasons why organizations need to boost their cyber-resilience

Despite skyrocketing cyber-security spending, 81% of CISOs still worry that data breaches remain unaddressed.

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

now hiring sign

How to build a cybersecurity team

Building a cybersecurity team to address growing security threats can be challenging. Learn how some companies are tackling the issue.

mobile security data protection [Thinkstock]

5 ways you could avoid and prepare for cyberattacks in your organization

Preparing for any potential cyberattack is an increasingly important precautionary steps in every organization. Here's how your team could do it without disrupting existing processes.

03 crimeware

Why are USB sticks wrinkle-free?

Roughly half of lost USB sticks and other mobile gadgets get returned to owners, which triggers the million-dollar question: What happens to the other half?

16 hackers

Hackers are aggressively targeting law firms' data

Even law firms are no longer safe from hackers. Here's why.

Load More
You Might Also Like