article thumbnail

What new cybersecurity trends will dominate 2017?

Tech Republic Security

What cybersecurity trends will emerge in 2017? In 2016 ransomware, phishing, and IoT attacks pummeled business and consumers alike. Take our survey to share your opinion about emerging hacker trends.

article thumbnail

White House Announces AI Cybersecurity Challenge

Schneier on Security

China has been doing this every year since 2017.) Interested would-be competitors can now submit their proposals to the Small Business Innovation Research program for evaluation and, eventually, selected teams will participate in a 2024 “qualifying event.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity and the 2017 US National Security Strategy

Schneier on Security

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan.

article thumbnail

SiteLock INFINITY for the 2017 Cybersecurity Excellence Awards

SiteLock

We’re excited to announce that SiteLock INFINITY was recently recognized as a finalist in the Cybersecurity Excellence Awards in the Anti-Malware category! The Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security.

article thumbnail

Experts predict 2017's biggest cybersecurity threats

Tech Republic Security

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year.

article thumbnail

Decoding Security 108: 2017 – The Year Everyone Got Hacked

SiteLock

2017 was a big year for malware, hacks, and data breaches. On the latest episode of Decoding Security, security analysts Jessica Ortega, Ramuel Gall, and producer/security analyst Topher Tebow count down the top ten cybersecurity issues of the past year. Your hosts discuss the facts and what happens next.

Hacking 98
article thumbnail

Breaking Barriers, Building Bridges: Cultivating Female Belonging in the Cybersecurity Landscape

Jane Frankland

I knew it was a crazy act, and perhaps it was unfair of me to subject him to it, but I wanted him to understand a pressing need in cybersecurity. My intention was to physically manifest the dire state of gender diversity for cybersecurity; to make him truly feel the weight of it all. It’s declined. For example, Byrnes et al.