| Security Blog News |
| Showing 'Security Blog News' from 51 to 60|
| |LikeWars: How Business Leaders Can Prepare For This Growing Threat Authors of the book LikeWar detail how social media can be weaponized. Read the questions they recommend business leaders ask and answer in preparation for a LikeWar.
| |Taming The Digital Wild West Congress must do more to encourage good Samaritan efforts in the cybersecurity community and make it easier for law enforcement to consistently collaborate with them.
| |Ohio Law Creates Cybersecurity Safe Harbor For Businesses Businesses showing good faith by modeling their cybersecurity after an approved framework will have legal protection under Ohios Data Protection Act.
| |Second-gen Facial Recognition Tech Aims To Improve Biometric Security Facial recognition technology is getting a second look from solutions vendors, though legal frameworks for how biometrics are used are out of date.
| |Redefining Critical Infrastructure For The Age Of Disinformation In an era of tighter privacy laws, its important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy.
| |Website Security Paradox: Whats A Small Business To Do? Small-business owners are considering whether to spend hard-earned money on historically less than effective cybersecurity and what it means if they dont. A security expert at GoDaddy weighs in.
| |The FTCs Cyberinsurance Tips: A Must-read For Small Business Owners Cyberinsurance might be the only way to truly survive a full-blown cyberattack. Before small business owners shop for cyberinsurance, they should check out these guidelines from the FTC.
| |25 Years Later: Looking Back At The First Great (Cyber) Bank Heist The Citibank hack in 1994 marked a turning point for banking -- and cybercrime -- as we know it. What can we learn from looking back at the past 25 years?
| |Notes On Self-Publishing A Book In this post I would like to share a few thoughts on self-publishing a book, in case anyone is considering that option.As I mentioned in my post onburnout, one of my goals was to publish a book on a subject other than cyber security. A...
| |How SMBs Can Minimize Damage From Ransomware Attacks The costs incurred from a ransomware attack can devastate SMBs, but there are ways to minimize the impact.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |