Cybercriminals see new opportunities to attack agencies by exploiting unsecured cloud-based services that were deployed as part of the shift to remote-work.
Posts Tagged: malware
Smart investments today are key to achieving stable footing and maximizing cybersecurity for the future. As you consider the risks and opportunities ahead, artificial intelligence (AI) offers real potential to strengthen cybersecurity operations and defend computer networks.
As organizations and citizen users increasingly depend on websites, mobile computing and web-based applications, they become exposed to greater privacy and security risks. Because of the open infrastructure of the Internet and the growing availability of hacking tools, almost anyone can carry out a cyberattack against any organization or user relying on networked applications and… Read more »
Cybersecurity has gone from a niche IT issue to a boardroom priority and Cross-Agency-Priority (CAP) for business and government organizations.
This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Most data breaches are caused by highly sophisticated malware, which can evade point-in-time detection technologies. Today, more than ever, it is essential for the government to protect its networks withRead… Read more »
OmniStudio is often asked if WordPress sites are more vulnerable to security breaches than other content management platforms. With all websites, even those run by Fortune 500 companies, the threat of hacking is ever present, regardless of the platform it’s built within. Professional website design and development firms who use open source platforms, like WordPress orRead… Read more »
For you Smart Phone Users…. BE AWARE! from bluebox’s blogUncovering Android Master Key That Makes 99% of Devices Vulnerable The Bluebox Security research team – Bluebox Labs – recently discovered a vulnerability in Android’s security model that allows a hacker to modify APK code without breaking an application’s cryptographic signature, to turn any legitimate applicationRead… Read more »
Cyber security is a hot topic among the private and public sector, especially as the consumerization of IT continues to grow as a trend and business tool. And although the Cybersecurity Act of 2012 failed to become a law, the need for strong cyber security measures, particularly within the federal government, has not diminished. IfRead… Read more »
Authored by Doug Kruger and originally posted to Blue Coat’s Federal Blue Print blog. There has been a lot of conversation around the new cybersecurity legislation and several bills have been circulating in Congress as lawmakers are faced with the growing reality of cyber attacks that should cripple critical infrastructure such as water, electricity orRead… Read more »
Bracketology is quickly emerging a new national pastime every March. We finally have a word to describe the hours upon hours devoted to determining the winner of the NCAA tournament. Is it Kentucky this year? What about Syracuse, North Carolina or Kansas? Well, GCN is getting in on the madness and asking people to voteRead… Read more »