Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: CyberSecurity
-

Cybersecurity has transformed what is actually a people problem with a technology component into its exact opposite. It’s almost impossible these days to avoid media coverage of Russia’s role in hacking the 2016 election. So it was in 2015, when news broke that Chinese hackers had breached the United States Office of Personnel Management. Likewise…
-

A bill that would encourage SMEs to follow cybersecurity guidelines is making its way through Congress as an addition to existing legislation encouraging the same of large corporates. Reports this week said the bill, the Main Street Cybersecurity Act, is an update to the existing Cybersecurity Enhancement Act of 2014 and would seek for the…
-

FARGO—It just might be a low-tech fake email, not a high-tech hacking scheme, that makes it hard for businesses and organizations to safeguard information in modern times. Firewalls and cutting-edge technology designed to keep networks safe and secure can be undone simply by asking employees to click a link. An email requesting employee W-2s that…
-

Cybersecurity threats are increasing each year, but businesses report shortage of qualified candidates coming out of undergraduate programs. Preparing the next generation of cybersecurity experts won’t be a quick fix, so business will need to get strategic. Cybersecurity is a growing concern across the globe and businesses are eager to build secure products and keep…
-

More than 4 billion electronic records were stolen in 2016, the result of more than 4,000 data breaches, according to a new report from Risk Based Security. That brings the number of records stolen by hackers to an all-time high. Today, every business — regardless of size, industry or location — is at risk for…
-

Shortly after Christmas, 2011, Ruby Nealon sold the Nintendo Wii games console his mother had bought him to fund an Open University course in computer software. He was 11 and it was the start of his unconventional education as a computer prodigy, which led him to drop out of school and start a full time degree…
-

bobsguide sat down with Peter Cohen, Strategic Director for Countercept at MWR InfoSecurity, to discover more about threat hunting, cybersecurity’s newest trend that putting humans back at the center of cybercrime defense systems in conjunction with innovative technology. What role does MWR play in the financial services market? There are two basic functions we perform…
-

SAN DIEGO — When it comes to cybersecurity, Americans recognize the need for strong passwords and know that public Wi-Fi hotspots aren’t necessarily safe for online banking or e-commerce. But U.S. adults are not as good at recognizing email “phishing” schemes or determining if the website where they’re entering credit card information is encrypted.…
-

The private sector operates much of U.S. critical infrastructure, but is it doing enough to further national cybersecurity strategy efforts designed to protect these assets? The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity…
-

Security experts will tell you that humans are the weakest link in the cyber security world. The facts speak for themselves, over 90 percent of security incidents are due to human error. This is when people do things like click on a bad link, open an attachment which is laden with malware or fail to…