Cybersecurity

Computer security (also known as cybersecurity or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet as a whole.The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.The worldwide security technology and services market is forecast to reach $67.2 billion in 2013, up 8.7 percent from $61.8 billion in 2012, according to Gartner, Inc.
Posts about Cybersecurity
  • What it will take to make digital identity real

    … their trust in companies to hold their data, even though they don’t trust them. Fixing the system means there has to be a single identifying entity that people trust, that has an established history of collecting and holding personal information. Banks are the most well positioned to do so, but for them, the first step is to begin designing trust…

    Digiday- 19 readers -
  • Citi’s latest cybersecurity bet veers from the usual model

    … – isn’t going away, these companies are heavily invested in analytics firms that monitor breaches, defenses and other activity to try to make sense of user behavior and identify patterns to help prepare for the next attack. That space is getting kind of crowded though, which is part of why Citigroup’s startup venture capital arm just invested…

    Digiday- 25 readers -
  • Businesses Still Neglecting Cybersecurity (Infographic)

    … failure for businesses. 66 percent of the security and IT professionals surveyed said their organizations are unprepared to recover from a cyber attack, and 75 percent lack a formal incident response plan, which has not changed since last year. John Bruce, CEO and co-founder of Resilient, which was recently acquired by IBM, notes that companies…

    Inside Facebook- 26 readers -
  • Influential Cybersecurity Blogger Gets Digitally Attacked

    … Influential Cybersecurity Blogger Gets Digitally Attacked October 20, 2016 by Meagan Freeman Leave a Comment Cybersecurity journalist Brian Krebs is no stranger to controversy or danger. Known to uncover online crime rings and fraud, Krebs has had plenty of experience with retalition. However, the recent digital attack on his website has…

    The Blog Herald- 9 readers -
  • Trust in Social Media Security Is at an All-Time Low (Infographic)

    …. Declining trust in security is not a new trend. There seems to be a disconnect wherein companies aren’t providing clear security protocols and users aren’t taking advantage of the tools to protect themselves. Clearer communication of the benefits of security tools could go a long way to solving both problems. View the infographic below–from Craig Newmark, Rad Campaign and Lincoln Park Strategies–for more details. Image on homepage courtesy of Shutterstock. …

    AllTwitterin Social- 17 readers -
  • Businesses: Take a Holistic Approach to Cybersecurity

    … Every business and organization needs to take a holistic approach to cybersecurity. To that end, providing resources and training staff members to maintain good security practices should be a top priority. We interviewed Alex Heid, chief research officer at SecurityScorecard, and gained some insight into how companies can improve their digital…

    Inside Facebookin Social- 13 readers -
  • Learn to Identify and Protect Yourself From Phishing Scams (Infographic)

    … of your data. An infographic from Digital Guardian provides a guide for identifying and avoiding phishing attacks. Unlike hacking, phishing is usually a confidence scam, where a cyber criminal will attempt to make users or employees believe they are a legitimate source. This can lead to leaks of personal information, or open vectors for malware…

    AllFacebook- 53 readers -
  • Survey: 77% of U.K. Internet Users Feel Internet is Becoming More Dangerous

    … Hillborn says it’s important for companies to employ “rigorous security procedures” to mitigate risks, he also encourages consumers to be proactive about their own digital security. He said in a statement: It’s also important for users to consider what protection they’ve got on the other devices they own. It’s not uncommon for users to access…

    AllTwitter- 13 readers -
  • Leaked Memo Exposes EU Government Plans for Cybersecurity

    … Encryption is one of the leading topics of discussion throughout the social media and technology industries. SocialTimes has reported in the past that end-to-end encryption is probably the only way to secure user privacy from both hackers and the government. With a cybersecurity summit scheduled to take place today, we might gain insight…

    AllTwitter- 10 readers -
  • IT Specialist Publishes 10 Million User Passwords to Prove a Point

    … addresses, and other information that might be \"particularly linked to an individual.\" Aside from giving researchers a large, clean data set, Burnett wanted to make a point about the government’s stance on hacking. President Obama has been offering various proposals for improving cybersecurity in the US, but Burnett sees a change to the Computer Fraud…

    Inside Facebook- 16 readers -
  • Obama Administration Requests $14B for Cybersecurity Infrastructure

    … From the credit card hacks of recent years, to the Sony hack that revealed gigabytes of data, it’s clear the country needs to get more serious about online security. To wit, the White House is requesting billions in funding for an updated Comprehensive National Cybersecurity Initiative. The new CNCI is a 12-point plan that maps out how…

    AllFacebook- 9 readers -
  • How to Duplicate Facebook’s Hacktober

    … October is an important month for cybersecurity at Facebook. Not only is it National Cyber Security Awareness Month – it is also the month when the social network holds Hacktober, its annual, monthlong initiative to build and maintain a security-aware culture. Director of security operations Jennifer Henley shared tips for other companies…

    David Cohen/ AllFacebookin Social Facebook How To's- 10 readers -
Get the top posts daily into your mailbox!
More from around the web