Cybersecurity certification qualifications are becoming the norm in many job descriptions today as organizations seek quantifiable ways of measuring prospective employees’ expertise. But certification alone should not be the yardstick in determining how well a potential candidate will fit into an organization.…
Malware for stealing out-of-band passwords for two-factor authentication demonstrates the need to maintain good security on mobile devices.
A sophisticated campaign using SQL Injection for Search Engine Optimization has been spotted by Akamai’s Threat Research Division, raising some questions about what is legitimate and what is proper.
As high profile cyberattacks make headlines, board members and senior management of companies large and small recognize that these attacks pose real threats to their revenue and reputations. As a result, investments in information security are essential.
So it would seem that chief…
The Tech Writers Bureau reaches out with a new Young Adult fantasy novel designed to support STEM education for young people. The novel is currently being considered for publication by the Amazon Kindle Scout program, and everyone who backs it now will…
A new multi-institutional project funded by NSF aims to bring software development from an art to a science, using formal logic and precise specifications for program behavior to create software that is verifiably reliable.
Predicting things is easy. Here are my predictions for 2016 on cyber insurance, the Internet of Things, continuous monitoring and passwords.
As the nation shifts to IP-based landline telephone service or cuts the cord to go mobile, carriers, consumers and regulators face a host of challenges in providing services we take for granted.
Despite legal victories against organized criminals who encrypt and hold computers for ransom, new malicious campaigns continue to crop up. The Senate Homeland Security and Governmental Affairs Committee is seeking information from DHS and the DOJ on the extent of the problem…
NIST is mulling over removing entropy requirements for passwords from its security guidelines. There really is no good way to measure how strong a password is, anyway.
