article thumbnail

Drone Technology – a Rising Threat to Cybersecurity

Security Boulevard

The post Drone Technology – a Rising Threat to Cybersecurity appeared first on PeoplActive. The post Drone Technology – a Rising Threat to Cybersecurity appeared first on Security Boulevard. Security Bloggers Network Cyber Security Cybersecurity Drone Technology

article thumbnail

HOT CYBERSECURITY TECHNOLOGIES

CyberSecurity Insiders

Nevertheless, the hacktivists (a combination of hacker and activist ) have found a persistent playground to play their part and constantly outsmart modern cyber security technologies. We must respond by reassessing our security infrastructure and technology, thereby responding appropriately.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology.

article thumbnail

54 Best Cybersecurity Podcasts For Technology Adepts!

SecureBlitz

Want the best cybersecurity podcasts? Every cybersecurity expert needs to stay updated on the latest happenings, tips, and information in the cybersecurity field. Technology has made cybersecurity information more accessible with the advent of podcasts, a more flexible […].

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

article thumbnail

SecureMySocial Issued 5th US Patent For Social Media Security Technology

Joseph Steinberg

I am happy (and proud) to announce that SecureMySocial, a cybersecurity company that I co-founded, has been issued its fifth United States patent for social media security. CyberSecurity News Social Media patent securemysocial social media security

Media 230
article thumbnail

Governnment Software Vendor Tyler Technologies Announces Breach

Adam Levin

Tyler Technologies, a software and technology provider for U.S. The post Governnment Software Vendor Tyler Technologies Announces Breach appeared first on Adam Levin. Data Security Government Cybersecurity Data breach featured data breach tyler technologies government breach

article thumbnail

Technology and Policymakers

Schneier on Security

Technology is now deeply intertwined with policy. It's all changing fast; technology is literally creating the world we all live in, and policymakers can't keep up. This technology has the potential to augment human decision-making, eventually replacing notoriously subjective human processes with something fairer, more consistent, faster and more scalable. The answer requires a deep understanding of both the policy tools available to modern society and the technologies of AI.

article thumbnail

Cybersecurity: It’s More Than Just Technology – The Human Element Matters Too

Security Boulevard

Many discussions about the human element in cybersecurity center around human fallibility and error. From misconfigurations to selecting weak passwords and getting duped by phishing emails, the mistakes people make play a visible role in cybersecurity incidents.

article thumbnail

Privacy As Enabling Technology

Security Boulevard

Recently, Google demonstrated a new smart glasses technology. The post Privacy As Enabling Technology appeared first on Security Boulevard.

article thumbnail

Radware Employs Blockchain Technologies to Thwart Bots

Security Boulevard

Radware this week revealed it added blockchain technologies to its Bot Manager platform to thwart attacks designed to evade completely automated public Turing tests to tell computers and humans apart—better known as CAPTCHA challenges.

article thumbnail

Best Practices for Hospitals To Manage Risks To CyberSecurity Created By Medical Technology And Information Systems: A Webinar With The CIA’s Former CyberSecurity Director And The Top CyberSecurity Columnist

Joseph Steinberg

What can hospitals learn from an ex-CIA cybersecurity director and a cybersecurity-expert columnist read by millions of people? CyberSecurity Events cia hospitals Sepio webinar

article thumbnail

Why Technology Convergence is the Future of Cybersecurity

Security Boulevard

The post Why Technology Convergence is the Future of Cybersecurity appeared first on Security Boulevard. Most IT security functions have accrued multiple point products over the years. Some were acquired through M&A activity. Others may have been brought in by successive CISOs.

article thumbnail

Intel is Maintaining Legacy Technology for Security Research

Schneier on Security

Interesting : Intel’s issue reflects a wider concern: Legacy technology can introduce cybersecurity weaknesses. Tech makers constantly improve their products to take advantage of speed and power increases, but customers don’t always upgrade at the same pace.

article thumbnail

Three cybercrime technology trends to watch in 2023

CyberSecurity Insiders

Technology’s rapid and relentless progress promises to continue apace in 2023, to everyone’s benefit – including cybercriminals’. The year promises a “Spy vs. Spy”-type cyberspace race as both criminals and defenders vie to gain the upper hand using new and emerging technologies.

article thumbnail

Queensland University of Technology hit by Ransomware

CyberSecurity Insiders

A ransomware hit Queensland University of Technology (QUT) in the early hours of today, crippling a portion of the institute’s network from the past 5 hours. The post Queensland University of Technology hit by Ransomware appeared first on Cybersecurity Insiders.

article thumbnail

SVB Collapse: A Stark Warning for Technology and Cybersecurity Startups!

CyberSecurity Insiders

After all, while COVID-19 was slaying government budgets worldwide, the technology industry was making hay (particularly companies that enabled people to work remotely, collaborate technologically or maintain/improve cyber security). appeared first on Cybersecurity Insiders.

Banking 52
article thumbnail

How Does Technology Improve Healthcare?

SecureBlitz

The post How Does Technology Improve Healthcare? appeared first on SecureBlitz Cybersecurity. The healthcare industry is such an important part of keeping society moving forward and improving the lives of citizens everywhere.

article thumbnail

How CyberSecurity Technology Companies Can Stand Out In A Crowded Field

Joseph Steinberg

Top cybersecurity influencer, Joseph Steinberg, was recently interviewed by Bob Geller, President of Fusion PR, as part of the latter’s series of monthly interviews of influential people in the world of public relations. CyberSecurity Entrepreneurship pr

article thumbnail

Technology’s contributions toward safety in healthcare

CyberSecurity Insiders

Technology in healthcare has the potential to make all the difference in terms of safety outcomes. But technology isn’t always safe. However, technology ultimately is doing more good than bad in healthcare. This blog was written by an independent guest blogger.

article thumbnail

Difference between Cybersecurity and Information Security

CyberSecurity Insiders

Many of you get confused with terms cybersecurity and Information Security and think that both these words are same and synonymous. Instead, Information Security is a part of a cybersecurity program that focuses mainly on protecting data from breaches and damage.

article thumbnail

Biometrics: The Future of Airport Technology

CyberSecurity Insiders

In our previous blog we discussed how Digital ID technology has the potential to greatly improve the efficiency, security – and ultimately customer journey at the airport with the announcement that American airlines recently launched their own Mobile ID scheme.

article thumbnail

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

Security Boulevard

The post 451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout appeared first on Security Boulevard.

article thumbnail

Cybersecurity technology is not getting better: How can it be fixed?

Tech Republic Security

A recent survey found an unusual reason cybersecurity is failing. Experts share what it is and how to correct it

article thumbnail

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

eSecurity Planet

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized identity, seem well suited for new threats that have exploded onto the scene in the last year.

article thumbnail

Deception Technology: How to Trick Cybercriminals Into Focusing on a Decoy

Security Boulevard

Well, that’s what deception technology is all about, and it’s a powerful tool for protecting your business from online attacks. Deception technology is a security measure that uses decoys to divert cybercriminals away.

article thumbnail

Cigent Technology Extends Firmware to Secure SSDs

Security Boulevard

Cigent Technology today launched Cigent Data Defense, an offering that combines existing multifactor authentication and encryption capabilities to secure sensitive data residing on solid-state drives (SSDs).

Firmware 102
article thumbnail

The ‘Hottest’ IT Security Technologies in 2022

CyberSecurity Insiders

Did you catch The ‘Hottest’ IT Security Technologies in 2022 webinar? This webinar focused on which security technologies are most widely deployed and most planned for acquisition in 2022. Deception technology / distributed honeypots. Deception technology / honeypots.

article thumbnail

ChatGPT: Hopes, Dreams, Cheating and Cybersecurity

Lohrman on Security

So what are the opportunities and risks with using this technology across different domains ChatGPT is an AI-powered chatbot created by OpenAI.

article thumbnail

The Best Cyber Security Technology Trends You Must Know

SecureBlitz

This post will show you the best cyber security technology trends you must know. Nevertheless, companies […] The post The Best Cyber Security Technology Trends You Must Know appeared first on SecureBlitz Cybersecurity.

article thumbnail

Hospital & Healthcare Technology - Case Study

Approachable Cyber Threats

They also know that technology plays a vital role in delivering that standard of care. > COMPLEXITY Modern healthcare organizations continuously adopt cutting edge technology and integrate it with legacy technology.

article thumbnail

2022 State of Operational Technology and Cybersecurity Report

Tech Republic Security

The 2022 State of Operational Technology and Cybersecurity Report, now in its fourth annual iteration, finds that organizations are still moving too slowly toward full protection of their operational technology (OT) assets. Based on a global survey of more than 500 operational technology (OT) security professionals, this year’s report finds that while OT security has. The post 2022 State of Operational Technology and Cybersecurity Report appeared first on TechRepublic.

article thumbnail

Using XDR to Consolidate and Optimize Cybersecurity Technology

The Hacker News

Businesses know they need cybersecurity, but it seems like a new acronym and system is popping up every day. Professionals that aren’t actively researching these technologies can struggle to keep up.

article thumbnail

10 Security Technologies to Secure Remote Work

Security Boulevard

These days, more and more people are working remotely, but much of that remote access technology is exposed to external threats. The move to online working has provided tons of new opportunities for cybercriminals looking to exploit unsecured technology systems.

article thumbnail

MSP Thrive Acquires InCare Technologies

Dark Reading

Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States

article thumbnail

Welcome Bureau of Cyberspace Security and Emerging Technologies (CSET)

Security Affairs

United States Department of State approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET). The CSET Bureau was created to increase the resilience of the country to foreign cyber-threats and lead the emerging cybersecurity diplomacy efforts.

article thumbnail

State Dept. to Create New Cybersecurity & Technology Agency

Dark Reading

Bureau of Cyberspace Security and Emerging Technologies (CSET) will serve as diplomatic arm for US cybersecurity interests

article thumbnail

Symphony Technology to acquire Cybersecurity Firm McAfee for $4 billion

CyberSecurity Insiders

American Cybersecurity firm McAfee has made it official that it is going to sell its enterprise business to Symphony Technology Group (STG) for all cash $4bn. The post Symphony Technology to acquire Cybersecurity Firm McAfee for $4 billion appeared first on Cybersecurity Insiders.

article thumbnail

Cyber Resiliency Isn't Just About Technology, It's About People

Dark Reading

To lessen burnout and prioritize staff resiliency, put people in a position to succeed with staffwide cybersecurity training to help ease the burden on IT and security personnel

article thumbnail

Cyber Resiliency Begins with People and Process, Not Technology

CompTIA on Cybersecurity

With compounding cyber risks businesses must begin to take a holistic approach to cybersecurity that starts with people and process—then technology

article thumbnail

Dell Technologies Streamlines Data Protection for VMware

Security Boulevard

Dell Technologies today unveiled an approach to capturing snapshots used to protect data in VMware environments that promises to reduce the total cost of defending organizations from ransomware.

article thumbnail

The Forensic Technology Behind Your Favourite T.V Detectives

CyberSecurity Insiders

While these characters are fictional, many of the techniques are very real – and there’s some amazing forensic technology out there that helps real-life investigations. Technology also helps to keep track of these. The post The Forensic Technology Behind Your Favourite T.V

article thumbnail

A New Cybersecurity “Social Contract”

Schneier on Security

From the Pure Food and Drug Act of 1906 to the Clean Air Act of 1963 and the public-private revolution in airline safety in the 1990s, the United States has made important adjustments following profound changes in the economy and technology.