Join Business Exchange
to access the most
relevant content for you,
filtered by like-minded
business professionals.
Learn more

CYBER SECURITY

The state of cyber security in both corporate and government arenas today touches virtually every part of society both physical and digital as the Internet becomes the equivalent of a pen as a necessary business device. Botnets, organized crime, corporate espionage, state sponsored terrorism, preemptive action and the protection of worldwide critical infrastructure are among the issues to be discussed.

Cyber Security is part of Business Exchange, suggested by Helen Distefano. This topic contains 4,037 news and 2,969 blog items. Read updated news, blogs, and resources about Cyber Security. Find user-submitted articles and reactions on Cyber Security from like-minded professionals.

Most Active

The most active stories in this topic based on user activity.

Good Reasons to Lock Down Your Wireless Networkmore

Anyone in proximity to your business, home or office may be within the exploitable footprint of Wi-Fi signal, they can...

Dr. InfoSec's Quotes of the Week (009)more

Who said, "In the cyber world, if someone launches an attack, you might not be sure who is behind it and you don’t...

Organized Web Mobsters Getting Jobs Insidemore

Organized crime rings recruit or place insiders to embezzle or skim monetary assets and data, the smaller end of these...

SaaS - The Value is in the Verticalmore

SaaS applications give the ability to build vertical applications that tie together different functional areas to meet...

Asia Just Does Not Get PCImore

Why are hackers in China and other Asian countries are trying to hack banks and merchants when there is a wealth of...

Apple Ping'd By Spam - They Didn't See This Coming?more

The security industry has been pointing out the migration of spam from an email-only venture to blog/forum comments,...

Europe's Reservations About Cloud Computingmore

German state data protection authorities recently criticized both cloud computing and the EU-US Safe Harbor Framework.

Do You Really Need Identity Theft Protection?more

Identity theft protection detractors say, Why pay a monthly fee when all you have to do is… The fact is, you can’t...

Reductions in FCPA Finesmore

Using a regression analysis, Hinchey concluded that those companies which did so voluntarily paid higher fines than...

Web Proxies and NetBIOS Targeted by Hackersmore

A high number of firewall blocks are coming from the US and Korea, and UDP:137, the name service of NetBIOS is the...

Geospatial Cloud Computing in Support of National Policymore

A few weeks ago I once again had the pleasure of participating in a private discussion on cloud computing with Mr.

It's time to ditch Windows, which one is your next OS?more

Google is phasing out the internal use of Microsoft’s ubiquitous Windows operating system because of security concerns,...

A Viable Solution to Skimming and Point of Sale Attacksmore

Bankers are taking great losses on cards and we need to explore creative ideas to mitigate these losses.

Ways for Effective Network Penetration Testingmore

Ways for Effective Network Penetration Testing Any security professional has his own way in conducting a penetration ...

Does Confidentiality Still Matter?more

The boundaries between private and public are pretty thin. Rather than ramp back, many people are continuously...

Symantec’s “Hack Is Wack,” And Cybersecurity’s Most Embarassing Market...more

The cybersecurity industry has an image problem: Antivirus products have all the cultural caché of toilet bowl cleaners.

Honeynet Log Challenge: Log Mysteriesmore

Honeynet just released its latest Forensic Challenge 5 - Log Mysteries. It is based on logs from a compromised virtual...

Bulletproof Hosting: The Path Forwardmore

The emphasis of law enforcement and the open source community has been focused on identifying and shutting down...

Is Social Media Destroying Rational Debate?more

Social media provides an excellent mechanism to reach a large population of geographically dispersed people – that is...

Lawmakers frustrated by Internet "kill switch" reportsmore

By Gautham Nagesh - Lawmakers seeking to craft a comprehensive cybersecurity bill are growing increasingly frustrated...

Poor Money Mule Not So Poormore

“Money mules” may be unsuspecting Americans who act as shipping managers, do the dirty work for the bad guy, and open...

Strategies for Quality in Software Developmentmore

Dr. Bill Curtis, Director, Consortium for IT Software Quality (CISQ) and the co-author of Capability Maturity Model...

Is Your Kid Ready for Email?more

Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the...

Thirteen Million Records Breached in 2010more

Even if you are protecting your PC and keeping your critical security patches and antivirus definitions updated, there...

Altering the Economics of Cybersecuritymore

Economic incentives currently favor the attackers - attacks are easy, cheap, you can steal billions and your chances of...

Topic Feed: Most active content in Cyber Security

Top Sources: Cyber Security

  • infosecisland.com
  • BusinessWeek
  • computerworld.com
  • Team Cymru Internet Security News
  • ft.com
  • information-security-resources.com
  • Washington Post
  • realtysecurity.com
  • LinkedIn Answers: Technology
  • CNET News.com

Most Active Users in this Topic

see all contributors in Cyber Security

Featured White Papers

Tweets on this Topic

Post a Job

Jobs in this Topic

Management Consultants, Global Practices PRTM | Waltham, MA
Posted: Aug 18
Cyber Defense Architect BAE Systems | Wahiawa, HI
Posted: Sep 3
Analyst 3, Information Security T-Mobile | Bellevue, WA
Posted: Aug 19
Cyber Security Manager Espn | Bristol, CT
Posted: Aug 10
Network Security Engineer-Walmart Global eCommerce Walmart | Brisbane, CA
Posted: Jul 31

Report comment contains invalid characters. ()
cancel
Search Cancel