article thumbnail

Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology.

article thumbnail

On Chinese-Owned Technology Platforms

Schneier on Security

I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SecureMySocial Issued 5th US Patent For Social Media Security Technology

Joseph Steinberg

The post SecureMySocial Issued 5th US Patent For Social Media Security Technology appeared first on Joseph Steinberg: CyberSecurity Expert Witness, Privacy, Artificial Intelligence (AI) Advisor.

Media 196
article thumbnail

Govt. Services Firm Tyler Technologies Hit in Apparent Ransomware Attack

Krebs on Security

Tyler Technologies , a Texas-based company that bills itself as the largest provider of software and technology services to the United States public sector, is battling a network intrusion that has disrupted its operations. Ransomware ransomware Tyler Technologies tylertech.com

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

article thumbnail

Should There Be Limits on Persuasive Technologies?

Schneier on Security

But as with many things, technology is fundamentally changing the nature of persuasion. Democratic societies, in particular, are in dire need of a frank conversation about the role persuasion plays in them and how technologies are enabling powerful interests to target audiences.

article thumbnail

Should Technology Product Training Be Free?

Lohrman on Security

article thumbnail

Where Next for Blockchain Technology After FTX Collapse?

Lohrman on Security

The bankruptcy filing by crypto giant FTX, along with the dramatic drop in the value of most cryptocurrencies in 2022, has raised new questions regarding the future of blockchain technology.

article thumbnail

HOT CYBERSECURITY TECHNOLOGIES

CyberSecurity Insiders

Nevertheless, the hacktivists (a combination of hacker and activist ) have found a persistent playground to play their part and constantly outsmart modern cyber security technologies. We must respond by reassessing our security infrastructure and technology, thereby responding appropriately.

article thumbnail

Drone Technology – a Rising Threat to Cybersecurity

Security Boulevard

The post Drone Technology – a Rising Threat to Cybersecurity appeared first on PeoplActive. The post Drone Technology – a Rising Threat to Cybersecurity appeared first on Security Boulevard. Security Bloggers Network Cyber Security Cybersecurity Drone Technology

article thumbnail

How To Choose A Web Technology Stack: A Complete Guide

Security Boulevard

But some commonalities can help you to understand how each technology works and what it can do for your project. The right technology stack is the foundation of any successful business. The post How To Choose A Web Technology Stack: A Complete Guide appeared first on POSITIWISE.

article thumbnail

Technology and Policymakers

Schneier on Security

Technology is now deeply intertwined with policy. It's all changing fast; technology is literally creating the world we all live in, and policymakers can't keep up. This technology has the potential to augment human decision-making, eventually replacing notoriously subjective human processes with something fairer, more consistent, faster and more scalable. The answer requires a deep understanding of both the policy tools available to modern society and the technologies of AI.

article thumbnail

Why Your Enterprise Needs FIDO Authentication Technology

Lohrman on Security

Where is this technology heading The Fast Identity Online Alliance (FIDO) offers a growing list of ways to authenticate users with a goal of reducing passwords. But why is it needed? How does it work?

article thumbnail

Lenovo's top 7 technology predictions for 2022

Tech Republic Security

From 5G transforming personal computing to better healthcare, technology in 2022 will do a lot of heavy lifting

article thumbnail

Top 6 Email Security Technologies for the Enterprise

Security Boulevard

It is important because email is a commonly used method of communication and is often used to transmit sensitive information such as personal data, The post Top 6 Email Security Technologies for the Enterprise appeared first on Security Boulevard.

article thumbnail

2023 Technologies to Secure Your Hybrid Workspace

The Security Ledger

For businesses looking to invest in the creation of a safer and more productive modern office environment, here’s a rundown of the top 2023 technologies to secure your hybrid workspace. .

article thumbnail

Privacy As Enabling Technology

Security Boulevard

Recently, Google demonstrated a new smart glasses technology. The post Privacy As Enabling Technology appeared first on Security Boulevard.

article thumbnail

Intel is Maintaining Legacy Technology for Security Research

Schneier on Security

Interesting : Intel’s issue reflects a wider concern: Legacy technology can introduce cybersecurity weaknesses. Tech makers constantly improve their products to take advantage of speed and power increases, but customers don’t always upgrade at the same pace.

article thumbnail

Your Guide to Cloud Security Technologies

Security Boulevard

This is an umbrella term for different technologies that provide cost-effective, innovative, and flexible data storage and analytic solutions to organizations. The post Your Guide to Cloud Security Technologies appeared first on Security Boulevard.

article thumbnail

Three cybercrime technology trends to watch in 2023

CyberSecurity Insiders

Technology’s rapid and relentless progress promises to continue apace in 2023, to everyone’s benefit – including cybercriminals’. The year promises a “Spy vs. Spy”-type cyberspace race as both criminals and defenders vie to gain the upper hand using new and emerging technologies.

article thumbnail

Technology, Progress, and Climate

We Live Security

The post Technology, Progress, and Climate appeared first on WeLiveSecurity. The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government?

article thumbnail

Queensland University of Technology hit by Ransomware

CyberSecurity Insiders

A ransomware hit Queensland University of Technology (QUT) in the early hours of today, crippling a portion of the institute’s network from the past 5 hours. The post Queensland University of Technology hit by Ransomware appeared first on Cybersecurity Insiders.

article thumbnail

Radware Employs Blockchain Technologies to Thwart Bots

Security Boulevard

Radware this week revealed it added blockchain technologies to its Bot Manager platform to thwart attacks designed to evade completely automated public Turing tests to tell computers and humans apart—better known as CAPTCHA challenges.

article thumbnail

How Does Technology Improve Healthcare?

SecureBlitz

The post How Does Technology Improve Healthcare? The healthcare industry is such an important part of keeping society moving forward and improving the lives of citizens everywhere.

article thumbnail

Reducing cyberbullying with reporting technology

Security Boulevard

The post Reducing cyberbullying with reporting technology appeared first on ManagedMethods. The post Reducing cyberbullying with reporting technology appeared first on Security Boulevard. It’s no shock that K-12 school districts have their hands full when it comes to bullying.

article thumbnail

Bogus Security Technology: An Anti-5G USB Stick

Schneier on Security

article thumbnail

API Security in Your Operational Technology (OT)

Security Boulevard

Operational technology encompasses supervisory control and data acquisition (SCADA), industrial control systems (ICS), and distributed control systems (DCS). The post API Security in Your Operational Technology (OT) appeared first on Security Boulevard.

article thumbnail

Top 15 Emerging Technology Trends to watch in 2023 and beyond

Security Boulevard

Technological upheavals continue to disrupt the world. The post Top 15 Emerging Technology Trends to watch in 2023 and beyond appeared first on ISHIR | Software Development India. Security Bloggers Network technology

article thumbnail

Operational Technology Cybersecurity in the Energy Sector

Tech Republic Security

Operational technology (OT) is essential to today’s industrial processes and equipment, not least of which in the energy sector. The post Operational Technology Cybersecurity in the Energy Sector appeared first on TechRepublic. The development and distribution of energy benefits greatly from digital transformation and the addition of Internet of Things (IoT) devices and monitoring systems.

article thumbnail

The Evolution of Automation Technologies

Security Boulevard

Automation is making waves in many industries worldwide and encompasses a wide range of technologies including endpoint management, robotic process Read More. The post The Evolution of Automation Technologies appeared first on Kaseya.

article thumbnail

Biometrics: The Future of Airport Technology

CyberSecurity Insiders

In our previous blog we discussed how Digital ID technology has the potential to greatly improve the efficiency, security – and ultimately customer journey at the airport with the announcement that American airlines recently launched their own Mobile ID scheme.

article thumbnail

BleepingComputer's most popular technology stories of 2022

Bleeping Computer

Technology2022 is over, and it's been filled with a wide assortment of stories ranging from the impact of Russia's invasion of Ukraine to the many bugs introduced by Microsoft Patch Tuesday updates for Windows. [.].

article thumbnail

Podcast: Securing Operational Technology

Security Boulevard

Johnson III, Cimcor CEO/President, discusses the latest views on securing operational technology environments. The post Podcast: Securing Operational Technology appeared first on Security Boulevard. In a recent podcast interview with Zack Hack, Host of Cybercrime Magazine, Robert E.

article thumbnail

54 Best Cybersecurity Podcasts For Technology Adepts!

SecureBlitz

Technology has made cybersecurity information more accessible with the advent of podcasts, a more flexible […]. The post 54 Best Cybersecurity Podcasts For Technology Adepts! Want the best cybersecurity podcasts? Read on!

article thumbnail

The ‘Hottest’ IT Security Technologies in 2022

CyberSecurity Insiders

Did you catch The ‘Hottest’ IT Security Technologies in 2022 webinar? This webinar focused on which security technologies are most widely deployed and most planned for acquisition in 2022. Deception technology / distributed honeypots. Deception technology / honeypots.

article thumbnail

What is NodeJS Technology? All-in-One Guide for 2022

Security Boulevard

While developing an application, selecting a backend technology is considered a time-consuming task. The post What is NodeJS Technology? The post What is NodeJS Technology?

article thumbnail

Deception Technology: How to Trick Cybercriminals Into Focusing on a Decoy

Security Boulevard

Well, that’s what deception technology is all about, and it’s a powerful tool for protecting your business from online attacks. Deception technology is a security measure that uses decoys to divert cybercriminals away.

article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.” They’re working on living their lives, and hoping technology helps.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. SOC should not spend time / resources managing such technologies.

article thumbnail

Three business trends that will determine how cloud technology develops in the UAE

Security Boulevard

The post Three business trends that will determine how cloud technology develops in the UAE appeared first on PeoplActive. The post Three business trends that will determine how cloud technology develops in the UAE appeared first on Security Boulevard.

article thumbnail

Cybersecurity: It’s More Than Just Technology – The Human Element Matters Too

Security Boulevard

Still, recent technological developments, Read More. The post Cybersecurity: It’s More Than Just Technology – The Human Element Matters Too appeared first on Nuspire. Many discussions about the human element in cybersecurity center around human fallibility and error.

article thumbnail

The Evolving Technology of Cybercrime

Security Boulevard

The post The Evolving Technology of Cybercrime appeared first on Ericom Blog. The post The Evolving Technology of Cybercrime appeared first on Security Boulevard.

article thumbnail

Technology’s contributions toward safety in healthcare

CyberSecurity Insiders

Technology in healthcare has the potential to make all the difference in terms of safety outcomes. But technology isn’t always safe. However, technology ultimately is doing more good than bad in healthcare. This blog was written by an independent guest blogger.