Security Rx: An engaged board
Key findings from security and privacy Protiviti’s survey, “Managing the Crown Jewels and Other Critical Data”
Key findings from security and privacy Protiviti’s survey, “Managing the Crown Jewels and Other Critical Data”
Enterprises are better protected from repercussions of a breach with a board that’s knowledgeable about security and which makes sure a comprehensive set of security policies are in place, reports Greg Masters.
Cyberwarfare can knock out physical machines and the attack can come from anywhere on the planet, reports Doug Olenick.
Nation-states are stockpiling software exploits to compromise and spy on their rivals. But do their gains represent a loss for manufacturers, developers and the public? Bradley Barth reports.
You might remember the scene in Moneyball in which A’s GM Billy Beane confronted a group of old-fashioned baseball scouts who would stubbornly evaluate players based solely on the “eye test,” rather than actually number-crunching their statistical data. Nowadays, ball clubs regularly leverage sabermetric data and use their own in-house systems to predict prospects’ success,…
Unsecure Internet of Things (IoT) devices and the increasing use of automation are leading to vulnerable robotic device, robots if you will, that if compromised by a hacker could inflict physical harm to human not to mention opening the device possibly compromising all types of personal information. While Terminators, droids and fantasy western resort hosts…
After Sept. 11, New York City’s Metropolitan Transportation Authority came up with a tagline intended to make citizens aware that each person is on the front line when it comes to defending the metropolis against another terror attack.
One might think that a net increase of 13,000 information technology jobs in February is a sign of healthy growth in the field, but a comparison to previous employment numbers from the Bureau of Labor Statistics (BLS) paints a more complex picture.
While industry-specific efforts to create some type of cybersecurity framework is helpful, stronger guidelines will be needed, reports Doug Olenick.