The U.S. House of Representatives passed three cybersecurity bills aimed at strengthening the federal government’s ability to prevent and respond to cyberattacks.
Moving information from enterprise data centers or in-network servers to a cloud environment is often chosen as a means to offload IT maintenance costs, provide a higher degree of physical safeguards and facilitate easier scaling to accommodate business growth.
Twenty-three percent of Canadian cybersecurity teams never speak with their executive team about cybersecurity, but of those that did, 23 percent spoke just annually, and 24 percent spoke with the C-Suite semi-annually. Only 13 percent of IT Canadian security professionals spoke with executives quarterly, according to a new Ponemon Institute study with Websense, Inc.
Representatives from Tesla Motors Inc., say the company will be investigating and rectifying any vulnerabilities discovered as a result of a hacking contest in Beijing starting today, of which the Tesla Model S sedan is the key target.
The Federal Communications Commission developed “Small Biz Cyber Planner 2.0” by teaming with members of the public and private sector, including the Department of Homeland Security, the National Cyber Security Alliance and the Chamber of Commerce.
If you asked your employees to define “cybersecurity,” what would they say?
July 1, 2014
By screening a provider for these qualities, you’ll accomplish much more than a manager who simply wants to “check the box” and get it over with. You’ll walk away knowing participants are getting the training that’s right for them, not an endless sea of faceless masses.
As a child, I played soccer fervently. My father, a German immigrant to the U.S. who was very passionate about the sport, explained to me that there is no game that brings the world closer together.
According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.