Learning how to battle cyber threats

And it’s one that’s emerging in places like Aroostook County, Maine. Cyber threats are becoming more common and they could hit at any time. “It affects everything from power, to finance, and business and people at home,” said Darren Woods, director of the Aroostook County Emergency Management Agency.

Optimizing Online Defenses Through Crowdsourcing

With limited time and money, many organizations are hamstrung when it comes to cyber defense. AlienVault’s CTO Roger Thornton discusses how the company’s crowdsourced, open-source community product, the Open Threat Exchange (OTX), can help. See the video in which Roger Thornton of AlienVault explain’s how companies can optimise their cyber defenses through crowd sourcing on Dark […]

This one fact about cybersecurity could save your company money

See how you can save money on your cyber security yet protect you from cyber attacks on Tech Republic.

Top 5: Reasons you need a bug bounty program

Bug bounties. The idea turns some folks’ stomachs. Invite people to break into your system and steal things and then when they do reward them? Well, yeah. You want people finding these cracks and telling you about them before someone with bad intentions does. Read about the top five reasons why every organisation should have a bug bounty […]

4 Steps to Take If Your Small Business Has Been Hacked

With technology being omnipresent in today’s business world it brings about both ways to enhance a small business as well as ways to sabotage a small business. One of the biggest threats technology brings is the potential for being hacked. Read/see the video explaining four steps that small and medium businesses need to take if […]

Decoding Internet Security: Internet of things

Here is what you need to know about the Internet of things: a term used to describe devices like a thermostat or baby monitor that connect to the Internet. See the video explaining the security aspects of Internet of Things on Washington Post.

Incident Response in Government

Automation should extend backwards in the chain, to the gathering and interagency sharing of information on emerging vulnerabilities, the status of patches and updates to critical software, and detection of attack attempts. Read experts talk about incident response policies of United States government on Federal News Radio.

Tips on Working With Law Enforcement After a Breach

Although it’s important to work with law enforcement after a data breach, organizations need to be careful about what information they share, says attorney Ruth Promislow, partner at Bennett Jones LLP. Read/see Ruth Promislow of Bennett Jones LLP explain how organisations can work with law enforcement agencies after a data breach on Bank Info Security.

Cybersecurity Firms Warn of New Malware Threat to Electric Grids

Two cyber security companies said they have uncovered a sophisticated piece of malicious software capable of causing power outages by ordering industrial computers to shut down electricity transmission. Read about the new malware threats to electric grids as warned by two cyber security companies on Fortune.

How to minimize the risk of a credit card hack

Another retailer says it’s been hacked. Kmart is urging customers to check their credit and debit cards after a “malicious code infected the payment data system.” Whether you shopped at Kmart or any of the other stores who faced massive breaches, one thing is for sure, we can’t depend on retailers to protect our cards. Read/see […]