When the European Union’s General Data Protection Regulations (GDPR) becomes enforceable, many firms in the US will still not prepared to meet the needs of the regulation come May 25, 2018 – but the penalties for non-compliance are significant for businesses.
While machine learning, an application of artificial intelligence, is not new, customers still struggle to understand how it will benefit their efforts to defend their critical assets. When evaluating this technology, here are the five key components that are critical to effective machine learning and successful protection of the endpoint.
The National Vulnerability Database (NVD is a leading source of intelligence on vulnerabilities for InfoSec professionals, and while it provides many benefits, it also has its limitations. This article will explain the advantages of using the NVD for vulnerability management, point out some of the blind spots that have occurred recently, and recommend best practices for successful mitigation.
A new strain of mobile malware, known as FakeBank, has been discovered by security researchers from Trend Micro. The new malware has been found in several SMS/MMS management software apps and is designed to steal banking information and funds. How do you detect these fraudulent transactions before they create a financial nightmare consumers and companies?
There are many issues confounding and complicating raising the next generation of technologists. Seven myths exist about technology careers discourage potential teenage technologists and their parents. As a leader of a philanthropic organization dedicated to creating on-ramps to tech careers, Charles Eaton considers busting those myths not only a duty, but a pleasure. Charles tackles these seven myths one-by-one here in his latest ITSPmagazine Experts Corner.
When it comes to medical devices deployed in clinical environments, diversity is a key factor. The reality is that not only are the medical devices manufactured by many different companies, but the underlying operating systems and software applications running on these devices are also incredibly diverse.
The cryptocurrency boom is underway. The talk of the town isn’t only about Bitcoin, the most popular form of digital cash. The value of some altcoins, including Monero (XMR), is steadily reaching new heights as well, adding more fuel to the furnace of the overall hysteria.
As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.
As more adults flock to online dating sites to meet "the one" they must also exercise caution. A new generation of scammers are setting their traps, creating fake profiles to extort cash and mine personal data from victims.
Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.
The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.
From the men who stare at goats to the possibility of seeing the gorilla, research has found that leveraging methods from unrelated fields produce breakthroughs. Cybersecurity consultant Rachel Phillips explains why employers would be wise to consider the value of non-traditional skillsets when looking for their next security “genius.”
As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.
Welcome to the last of our three-part GDPR series. In this
Jessica Lang from Kaizen reveals the ten cyber attacks that have rocked the world in recent years, and hit 5.4 billion accounts in total.
We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.
From stolen emails to hacked credit reports to acts of industrial espionage we never hear about and now processor vulnerabilities, data breaches can cripple organizations, compromise customers, invite regulation and destroy systemic confidence. Will 2018 be the year when new approaches finally result in the number of breaches leveling off?
On May 25, 2016, the GDPR (General Data Protection Regulation) became law in 28 European countries, marking the arrival of the biggest piece of legislation ever created on a Global scale. We are now rapidly approaching the date when enforcement of the new law will commence in 2018. The most important and significant thing to remember about the regulation is its global scope — this means that wherever you are in the world, if you hold or process personal data of Europeans, then you and your company must comply.
One might never think that Cisco would be involved with wearable tech, never mind breast cancer – but a movie? The film tells the story of a startup that seeks to bring a medical product to market - a product that is connected to the Internet and driven by big data.