- Seven technology predictions for 2014
- Hacker-built drone can hunt, hijack other drones
- The week in security: Microsoft fights NSA as shadow IT bites business
- French Treasury accidentally signs SSL certificate for Google.com domains
- Information Commissioner received no eHealth privacy complaints in 2012-13
The Internet Security Alliance, a multi-sector trade association, wants to know what adoption of a new cybersecurity framework will entail for companies in critical infrastructure industries
A movement to stop or regulate the development of so-called 'killer robots' got international backing at a meeting of the United Nations this week.
The central system built to support Affordable Care Act health insurance exchanges has successfully completed security testing and is set begin operating on October 1, the Centers for Medicare & Medicaid Services announced Wednesday.
Though the National Security Agency spends billions of dollars to crack encryption technologies, security experts maintain that properly implemented, encryption is still the best way to maintain online privacy.
Fugitive classified document leaker Edward Snowden, holed up at Moscow's Sheremetyevo International Airport since June 23, today accused the U.S. government of using 'historically disproportionate aggression' to get him back to the United States to face charges of violating the Espionage Act of 1917.
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.