[ad_1] Stuck at home with a primary- or secondary-school student? Organizations from professional training groups to national governments are teaming up to offer virtual cybersecurity training for teens — in some cases, for free. Schools and parents unsure about what to do with primary school students stuck with remote learning will soon have another option:
[ad_1] Accustomed to working in the same room, security teams now must find ways to operate effectively in the new remote reality. If managing a SOC under normal conditions isn’t hard enough, adjusting operations during the COVID-19 crisis has been particularly hard on those who run information security operations centers. Not too long ago, we
[ad_1] An epidemiologist-turned-CTO describes the parallels between the spread of a computer virus and the real-world coronavirus.
I switched from epidemiology to network security as my day job years ago, but today’s pandemic reminds me of the similarities between the two fields. There are many lessons we can take from the real-world virus and apply
[ad_1] They’re especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords. The Star Wars film franchise has fascinated society with unprecedented fervor for over 40 years, and it’s easy to see why: They’re Shakespearean tales with lightsabers and spaceships. But aside from timeless lessons about love
[ad_1] Capital One, Macy’s, FEMA, and others: key takeaways from the year’s most notable breaches. 1 of 8 2019 is on track to be the worst year ever for data breaches. Over 7.9 billion (with a “b”) data records were exposed in the first nine months of this year alone from a total of 5,183
[ad_1] There is no one road to security operations success, but these guidelines will smooth your path. Today’s modern security operations centers (SOCs) face a variety of challenges, ranging from organization and structure to technology and budgets. Third-party SOCs (such as Arctic Wolf, and other companies) are responsible for detecting and responding to threats, leaving
[ad_1] A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process. When a security researcher needs to create an application, there are many choices in terms of programming languages and frameworks. But when project requirements include SSL and an embedded
[ad_1] Half of survey respondents cite phishing scams or data exposure as most significant In a recent audience survey, Cyber Security Hub realized that media coverage has a lot to do with what drives more awareness of where cyber security professionals should be focusing. In an open-ended survey question, we asked respondents to identify what
[ad_1] Theranos flamed out in spectacular fashion, but you can still learn from the company’s “worst practices.” In Alex Gibney’s absorbing new HBO documentary, “The Inventor: Out for Blood in Silicon Valley,” we see the cautionary tale of Elizabeth Holmes, the now infamous entrepreneur who dropped out of Stanford at age 19 to start Theranos.
[ad_1] When selecting targets, attackers often consider total cost of ‘pwnership’ — the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy. Recently, two in-the-wild exploits for zero-day vulnerabilities in Google Chrome and Microsoft Windows were disclosed by Google’s TAG (Threat Analysis Group). The event made headlines,