The reason cybersecurity is a process, not a one-time solution, is that the Bad Guys - whether careless or malicious employees, hacktivists, cybercriminals, or rogue governments (not to be confused with the good governments, which only spy on us for our benefit) - are a problem that will never go away. Come join the discussion!
One of the main arguments that should be touched by IoT discussion is cryptography. There is an undisputed consensus that cryptography is a mandatory requirement to preserve security and privacy in the IoT world, but we are far away for a general consensus on how to operate.
Technology providers and their customers are joining forces to advance a standard format for vendors to disclose cybersecurity vulnerabilities.
This post is part of a CityLab series on borders-both real and imagined-and what draws so many of us to places on the edge. On its face, a passport is little more than a booklet barely the size of a greeting card. Come join the discussion!
A domain Generating algorithm or the DGA as it is popularly known is a type of program that can help malware in getting new domains instantly whenever someone controlling the software demands. The algorithm became very famous after conficker started spreading.
Over the last several years, I've noticed the role of CIO transitioning increasingly to business experience rather than IT. Likewise, the CISO position is often given to those lacking any hard skills in security.
We are so glad to present to you a training course, offered for free exclusively to Peerlyst users. Chris Romeo and his team at Security Journey created this new form of training, and we're thankful for them allowing us to take it to a test drive.