Search Results for "cyber war"


  • Does Modern Video Surveillance Create Cybersecurity Vulnerability?
    by Aaron Smith https://unsplash.com/photos/oQD9uq4Rd4I Smart video surveillance is the kind of technology that lets you see through your cameras from your smartphone over the internet, or connect your cameras with other devices in your home. They’re great for improving the physical security of y...
  • Interview: How are cybersecurity businesses tackling the Ukraine crisis.
    An interview with Morten Kjærsgaard, CEO of Heimdal Security Morten Kjaersgaard is the CEO of Heimdal Security, a leading European provider of cloud-based cybersecurity solutions based in Copenhagen, Denmark. He has a degree in Corporate Marketing and prior to Heimdal, he spent his years at the top...
  • Seminar: The Evolution of Ransomware
    I will be presenting this one-hour seminar on ransomware for the training company Vinsys Be #Ransomware Ready! Learn to deal with the modern ransomware. In our webinar “#Cybersecurity: The Evolution of Ransomware” by Mr. Bob Weiss, you will get valuable insights on how the ransomware attacks...
  • Beware of Romance Scams
    Romance scams or online dating scams have been one of the top crimes based on the dollars lost to victims.  As Valentine’s Day is upon us the National Cybersecurity Alliance has sent out some resources for me to pass along. The first is the Online Romance Scams (5) tip sheet, which you can do...
  • Sunday Funnies – High Tech Cat Warmer
    I love this article from the Smithsonian Five cats pile onto a Starlink satellite dish in a snowy yard. Aaron Taylor via Twitter As cold weather and storms plague parts of the United States this winter, cat owners can count on their fluffy companions to curl up in the warmest spots they can reach....
  • 5 Top Cybersecurity Threats to Businesses in 2022
    Cybersecurity attacks are destructive activities that target Information technology systems. It also targets the users using them in order to gain unlicensed access to the systems and the information they contain. This is where a cybersecurity company comes into business by providing the required pr...
  • Week 4: Prioritizing Cybersecurity in a Hybrid Workplace
    In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the...
  • Week 3: Why You Should Consider a Cyber Career
    Cybersecurity is one of the hottest sectors today, with new threats and challenges emerging each day. And with that, there is a huge push being undertaken by both business and education sectors to attract individuals toward a degree and career in cyber. Interested in joining this exciting new workfo...
  • Week 1: Get Familiar with the Cyber Basics
    At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and Kaseya breaches as well as high-profile attacks on the Colonial Pipeline and other critical inf...
  • Its A Software-Defined Virtualized World
    One of the trends that I am seeing, at least as it applies to the curriculum used in most cybersecurity certifications, such as the CISSP, CASP+, and CySA+, is that technology is moving to a software-defined, virtualized everything.  The latest issue of the Internet Protocol Journal, Volume 24, Is...
Page 5 of 148 «...34567...»