7 years ago066Findings unveil concerns related to the Trump administration, nation-state attacks, WikiLeaks & more
A majority of the cybersecurity industry's most experienced professionals believe that a major breach of U.S. critical infrastructure will occur in the next two years – and they don't believe current U.S. defense and government...
7 years ago066Julie Xiang has joined Merlin International, a leading cybersecurity and IT solutions provider, as the company's Vice President of Sales.
Xiang has held leadership positions at IBM, Oracle, and Datatel Inc. While at IBM, she received significant achievement recognition including four years as an IBM Hundred Percent Club Awardee,...
8 years ago053Civil and human rights groups issued denunciations and some cybersecurity experts urged their clients to stop using the popular Yahoo Mail service after a news agency reported Tuesday that the internet service provider had secretly scanned hundreds of millions of clients’ emails at the behest of U.S. intelligence agencies.
The...
8 years ago056Women represent only 11% of the global information security workforce, including in financial services, despite a shortage of cybersecurity skilled personnel overall.
Credit unions have to be more security-minded as staff and members connect through many devices. However, in seeking help, credit unions must realize that the...
8 years ago050Sheer Network Scale Offers Hope for Solving Related Challenges
Imagine the cybersecurity implications of a world in which hundreds of millions of people have a physical impairment that leaves them internet-connected.
Thanks to the "internet of things," that scenario is fast becoming reality in the form of internet-connected hearing...
8 years ago051Tech Data (TECD) is expanding its list of available services with the launch of the Security and Information Management business unit, the distributor announced on Monday.
The new business unit will work to drive customer enablement, recruit new resellers and bring more security vendor partners into Tech Data’s partner ecosystem in...
8 years ago052Leveraging Artificial Intelligence to address cyber security can enable organizations a fast and efficient response to a cyberattack
Organizations quite often spend millions of dollars on deploying various technologies on cybersecurity to defend against data breaches. Despite that, devastating hacking continues to occur.
Let's not...
8 years ago053Today’s independent financial advisors wear many hats, from portfolio manager to behavioral coach to chief financial officer of their own businesses. But there’s another responsibility that has become increasingly critical in recent years—that of identity protector. With major security breaches and other smaller-scale hacks on the...
8 years ago048Eight universities have begun a year-long initiative to train IBM Watson for work in cybersecurity. Will the Jeopardy champ soon police the internet?
On Tuesday, IBM announced that Watson, its cognitive computing system (and former Jeopardy champion), will be spending the next year training for a new job—fighting...
8 years ago043New study from CompTIA reveals big areas of opportunity for the channel
CompTIA recently released a new study examining the changing nature of cybersecurity offerings from service providers. Security in the IT Channel surveyed 400 IT channel executives on how they’re delivering security services to their customers. From user...
8 years ago041Students can graduate from any one of the top 10 U.S. computer science programs without taking a single course on cybersecurity.
A new study out from CloudPassage -- a cloud security firm based in San Francisco -- concludes that the American higher-education system is failing at preparing students for careers in...