Anyone in proximity to your business, home or office may be within the exploitable footprint of Wi-Fi signal, they can...
Join Business Exchange
to access the most
relevant content for you,
filtered by like-minded
business professionals.
Learn more
CYBER SECURITY
The state of cyber security in both corporate and government arenas today touches virtually every part of society both physical and digital as the Internet becomes the equivalent of a pen as a necessary business device. Botnets, organized crime, corporate espionage, state sponsored terrorism, preemptive action and the protection of worldwide critical infrastructure are among the issues to be discussed.
Cyber Security is part of Business Exchange, suggested by
Helen Distefano.
This topic contains
4,037 news
and
2,969 blog
items.
Read updated news, blogs, and resources about Cyber Security. Find user-submitted articles and reactions on Cyber Security from
like-minded professionals.
Most Active
The most active stories in this topic based on user activity.
Who said, "In the cyber world, if someone launches an attack, you might not be sure who is behind it and you don’t...
Organized crime rings recruit or place insiders to embezzle or skim monetary assets and data, the smaller end of these...
SaaS applications give the ability to build vertical applications that tie together different functional areas to meet...
Why are hackers in China and other Asian countries are trying to hack banks and merchants when there is a wealth of...
The security industry has been pointing out the migration of spam from an email-only venture to blog/forum comments,...
German state data protection authorities recently criticized both cloud computing and the EU-US Safe Harbor Framework.
Identity theft protection detractors say, Why pay a monthly fee when all you have to do is… The fact is, you can’t...
Using a regression analysis, Hinchey concluded that those companies which did so voluntarily paid higher fines than...
A high number of firewall blocks are coming from the US and Korea, and UDP:137, the name service of NetBIOS is the...
A few weeks ago I once again had the pleasure of participating in a private discussion on cloud computing with Mr.
Google is phasing out the internal use of Microsoft’s ubiquitous Windows operating system because of security concerns,...
Bankers are taking great losses on cards and we need to explore creative ideas to mitigate these losses.
Ways for Effective Network Penetration Testing Any security professional has his own way in conducting a penetration ...
The boundaries between private and public are pretty thin. Rather than ramp back, many people are continuously...
The cybersecurity industry has an image problem: Antivirus products have all the cultural caché of toilet bowl cleaners.
Honeynet just released its latest Forensic Challenge 5 - Log Mysteries. It is based on logs from a compromised virtual...
The emphasis of law enforcement and the open source community has been focused on identifying and shutting down...
Social media provides an excellent mechanism to reach a large population of geographically dispersed people – that is...
By Gautham Nagesh - Lawmakers seeking to craft a comprehensive cybersecurity bill are growing increasingly frustrated...
“Money mules” may be unsuspecting Americans who act as shipping managers, do the dirty work for the bad guy, and open...
Dr. Bill Curtis, Director, Consortium for IT Software Quality (CISQ) and the co-author of Capability Maturity Model...
Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the...
Even if you are protecting your PC and keeping your critical security patches and antivirus definitions updated, there...
Economic incentives currently favor the attackers - attacks are easy, cheap, you can steal billions and your chances of...
Top Sources: Cyber Security
- infosecisland.com
- BusinessWeek
- computerworld.com
- Team Cymru Internet Security News
- ft.com
- information-security-resources.com
- Washington Post
- realtysecurity.com
- LinkedIn Answers: Technology
- CNET News.com
Tweets on this Topic
![Powered by Twitter](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fbx.businessweek.com/images/powered-by-twitter-sig.gif=3f519)
![PCTechHelp](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/912070902/photo_normal.jpg)
![secuobsrevueus](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa0.twimg.com/profile_images/882382152/tux_bigger_normal.gif)
![CommoditiesNews](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa3.twimg.com/profile_images/417118891/oilwell_normal.jpg)
![secwatchigss](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/1081724190/centaur_normal.png)
![SurvivalHive](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa1.twimg.com/profile_images/190519541/Survival-Hive-Icon_normal.png)
![secwatchigss](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/1081724190/centaur_normal.png)
![iJoob](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa0.twimg.com/profile_images/1094185516/ijoob_cyber_normal.jpg)
![kstan](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/366526866/100x100falloutav-vb_1__normal.gif)
![JDFielder](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/1118752030/Me_normal.jpg)
![CareerAndBizOps](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/991099878/group-of-business-people-walking-towards-camera-thumb5293630_normal.jpg)
![lexorval](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa1.twimg.com/profile_images/868727097/val_normal.jpg)
![preciouspoch](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa2.twimg.com/profile_images/649853794/12161_1278966016702_1306567076_30846593_5474683_n_normal.jpg)
![iiricafortii](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa0.twimg.com/profile_images/142036516/hubad2_normal.jpg)
![BinaryBlogger](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20100907051731im_/http:/=2fa3.twimg.com/profile_images/1090224407/66557-6_normal.jpg)