You searched for cyber | SC Media

Your search for cyber returned 10 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last Word remove
Security News remove

Your search for cyber returned 10 results

Sort Results:

Relevant Recent
Opinion, Security News

Beyond cyber awareness month

While National Cybersecurity Awareness Month and Critical Infrastructure Security and Resilience Month are important moments in time to direct our attention to cybersecurity challenges, the reality is we need more than two months of cyber conversation. We need a continuing, year-round dialog about why cybersecurity matters. It’s important to weigh the combination of people, process…
Security News

What pill can I take for cyber insecurity?

Ahhhhh, the internet. We are hooked, and we better be prepared for the consequences. Real dollars are being lost, identities are being stolen, botnets are running rampant, consumer ATM cards are being compromised, spam is jamming our inboxes, the press is reporting stories that contribute to consumer cyber fears, and mankind again finds itself waging a protracted war — this time against internet insecurity.
Security News

Preempting today’s cyberattacks

Despite the efforts of many technology companies to make networks and products more secure, the number of vulnerabilities found on computer systems has proliferated in the five years since September 11, 2001. According to the Computer Emergency Response Team (CERT) Coordination Center, the number of known vulnerabilities climbed from roughly 2,000 in 2001 to nearly 6,000 in 2005.
Features

Diversity and AI

I recently underwent spinal fusion surgery and I can’t help but be disappointed that AI-powered nanobots are not yet a thing when it comes to some medical treatments. I remember fondly in my youth promises that machines and AI-powered technologies would change the world in my lifetime. After all, having expertly trained microscopic bio-bots rebuilding…
Security News

Meet your attackers on their own own turf

There's plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications.
Next post in Features