Saturday, April 29, 2017

Security News This Week: Yeah, About That Carrier Steaming Toward North Korea

Security News This Week: Yeah, About That Carrier Steaming Toward North Korea
Each weekend we round up the news stories that we didn't break or cover in depth but that still deserve your attention. The post Security News This Week: Yeah, About That Carrier Steaming Toward North Korea appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/security-news-week-yeah-carrier-steaming-toward-north-korea/

The US Takes On the World in NATO’s Cyber War Games

The US Takes On the World in NATO’s Cyber War Games
Last year, the US finished last in Locked Shields, NATO's cyber war games. This year, it had its eye on redemption. The post The US Takes On the World in NATO's Cyber War Games appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/us-takes-world-natos-cyber-war-games/

Cybersecurity is now as important as health and safty

Cybersecurity is now as important as health and safety for any company

Cyber security is quickly becoming a global issue now affecting businesses and organizations of all sizes around the world. Every employee is at risk at all levels of an organization. The time has come for organizations and businesses to see cybersecurity as an extremely important issue and consider it on par with health and safety issue.

Enterprises need to raise the awareness of cyber security and make a part of normal campaigns that also spread awareness of health and safety. Why?

Because let’s face it, today is a connected world. Our computers, our televisions and even our fridges are now connected to the network and the internet. Even medical devices such as pacemaker are now connected to some sort of a smart device, leaving it open to attack from cyber criminals. This is why cyber security should now become a part of any health and safety campaign.

Businesses don’t realize how much it is important to boost cyber security in the workplace. It has become increasingly important to protect your workspace simply because of the adverse effects a cyber crime can cause to existing aspects of any business. Cyber crimes have and will continue to put companies out of business if the issue is not taken seriously. Any data breach, system lock or other cyber attacks can cause a business to be heavily fined by data protection authorities if found that they did not implement a core cyber security strategy.

This has caused many sensible businesses and organizations to implement a core cyber security strategy where they conduct regular training and awareness programs so that everyone knows how much dangerous the threats can be if not taken seriously.

Statistics show that 38% of data breaches are internal. It reveals that companies are in fact ignoring employee awareness that is causing breaches due to their negligence. So the first step is to spread awareness internally so all of the employees in a company understand how to protect themselves and the company from cyber criminals.

Since cyber criminals are taking advantage of the latest technology to conduct their attacks, companies should step up their game and make use of advanced defensive technology to fight back, which can only be done if there is enough awareness so that everyone can take this issue seriously.

 

The post Cybersecurity is now as important as health and safty appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cybersecurity-now-important-health-safty/
via The Cyber Security Portal

A Big Change in NSA Spying Marks a Win for American Privacy

A Big Change in NSA Spying Marks a Win for American Privacy
The NSA won't collect the emails of US citizens just because they mention a foreign target. That's a big deal. The post A Big Change in NSA Spying Marks a Win for American Privacy appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/big-change-nsa-spying-marks-win-american-privacy/

Amazon’s ‘Echo Look’ Could Snoop a Lot More Than Just Your Clothes

Amazon’s ‘Echo Look’ Could Snoop a Lot More Than Just Your Clothes
Amazon put Alexa inside a camera---one that could know more about you than you realize. The post Amazon's ‘Echo Look’ Could Snoop a Lot More Than Just Your Clothes appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/amazon-echo-look-privacy/

An Obscure App Flaw Creates Backdoors In Millions of Smartphones

An Obscure App Flaw Creates Backdoors In Millions of Smartphones
Researchers at the University of Michigan expose how an obscure feature of thousands of apps can give hackers remote access into your phone's most sensitive guts. The post An Obscure App Flaw Creates Backdoors In Millions of Smartphones appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/obscure-app-flaw-creates-backdoors-millions-smartphones/

Friday, April 28, 2017

Insecure by default? What users need to know before they put company documents in the cloud

Last month, InfoWorld reported that people are sharing files with sensitive personal information “with the world” on Microsoft’s Docs.com site, which at the default settings can be searched and accessed by virtually anybody. You can be sure there are employees out there using the site, and others like it, for uploading company files, as well. […]

from SweetTech http://feedproxy.google.com/~r/TalkTechToMe-All/~3/Z6UzzV13gS0/

A Clever Plan to Secure the Internet of Things Could Still Have Big Drawbacks

A Clever Plan to Secure the Internet of Things Could Still Have Big Drawbacks
Relying on companies to secure IoT at the device level hasn't worked. Cloudflare has a different approach. The post A Clever Plan to Secure the Internet of Things Could Still Have Big Drawbacks appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/clever-plan-fix-iot-security-still-drawbacks/

The Genial, Brilliant, Candy-Loving Hackers of Stetson West

The Genial, Brilliant, Candy-Loving Hackers of Stetson West
They are young but not selfish. Brilliant but not dorky. Engaged but not political. The current class of college-age hackers will shape our future. The post The Genial, Brilliant, Candy-Loving Hackers of Stetson West appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/the-genial-brilliant-candy-loving-hackers-of-stetson-west/

The Breast Pump Finally Joins the 21st Century

The Breast Pump Finally Joins the 21st Century
The device millions of women rely on is stuck decades behind the times. Now tech entrepreneurs are hacking this essential tool of motherhood. The post The Breast Pump Finally Joins the 21st Century appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/building-a-better-breast-pump/

Oh Great, Now Alexa Will Judge Your Outfits, Too

Oh Great, Now Alexa Will Judge Your Outfits, Too
Et tu, Alexa? The post Oh Great, Now Alexa Will Judge Your Outfits, Too appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/oh-great-now-alexa-will-judge-outfits/

Thursday, April 27, 2017

New Buy Only American Rule Could Seriously Hurt Pentagon Tech Buying

Cybersecurity firm has enough evidence to believe Chinese hackers tried to hack US-built missiles

Ex-officials from the Pentagon are warning that newly tightened ‘Buy American’ rules that ask the government to buy U.S made only products could seriously hurt the military’s ability to buy technology which is often not necessarily made in America.

The issue was raised at the house hearing about Pentagon’s IT operations. The hearing took place one week after President Donald Trump revealed his Buy American and Hire American order.

This could seriously limit the ability to get the best weapon systems for the warfighters. The hearing mostly agreed on the fact that it could seriously hamper technology buying at the Pentagon.

Read more details 

The post New Buy Only American Rule Could Seriously Hurt Pentagon Tech Buying appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/new-buy-american-rule-seriously-hurt-pentagon-tech-buying/
via The Cyber Security Portal

China May Have Tried To Hack Missile Defense System

Trump’s Buy America, Hire America order could hinder Pentagon’s tech buying

A cybersecurity company in the U.S have reason enough to believe that Chinese hackers sponsored by the state could have tried to hack into an organization that had close connections with the US-built missile system based in South Korea.

According to a spokesperson from the company, China is pretty involved in cyber espionage regularly. He also said that they have enough evidence to prove that the Chinese hackers targeted at least one party that has connections with the missile placements.

According to him, prompt defensive measures placed in the organization helped prevented the attack.

Read more details 

The post China May Have Tried To Hack Missile Defense System appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/china-may-tried-hack-missile-defense-system/
via The Cyber Security Portal

Wednesday, April 26, 2017

Transcribing Audio Sucks—So Make the Machines Do It

Transcribing Audio Sucks—So Make the Machines Do It
Trint is the first product to offer the automated transcription of audio featuring two or more speakers in natural conversation. The post Transcribing Audio Sucks—So Make the Machines Do It appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/trint-multi-voice-transcription/

How to Stream Live Television Without Paying for Cable

How to Stream Live Television Without Paying for Cable
Get the best of live, on-demand, and streaming television without paying for cable The post How to Stream Live Television Without Paying for Cable appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/stream-live-television-without-paying-cable/

Review: iWalk2.0

Review: iWalk2.0
A high-tech alternative to crutches and knee walkers. The post Review: iWalk2.0 appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/review-iwalk2-0/

The 10-Year Quest to Make Your Phone Do Everything

The 10-Year Quest to Make Your Phone Do Everything
What if you could turn every screen, keyboard, and surface into exactly the gadget you need, for exactly as long as you need it? The post The 10-Year Quest to Make Your Phone Do Everything appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/10-year-quest-make-phone-everything/

The biggest cybersecurity threats to businesses

The biggest cyber security threats to businesses these days.

With phishing emails at their highest right now, business email compromise (BEC) is costing billions in damages since 2015. It has become more than crucial for companies to be aware of how hackers attack and how they can compromise your business.

BEC basically has an actor pretending to be a senior of the company and requesting the colleague in that company into wiring a fixed amount of money for a top secret company information. Phishing is quite threatening because many people don’t bother asking questions, they do just as told in the email.

Even if the highest security is placed, humans are easy to trick and someone clever enough can easily get past those security measures and make a fool out of someone.

Social media itself has also become quite a big threat to many businesses. Phishing is happening on social media in full force these days. People assume a role of someone senior by stealing a profile and through that they can easily request someone to send them money in the company. The only way to save from social media scams is to make sure good security is in place and awareness is spread across the employees.

Businesses can only defend themselves against these phishing attacks by spreading awareness. Occasional conferences should take place with training programs teaching the employees the fundamentals of cyber security, the threats it poses and how to recognize simple cyber attacks like phishing on email, phone, and social media.

After all, if one employee is hacked in a company, it would allow the hacker to easily get information about other systems connected to the network. that means in a short time span, a hacker would be able to hack the entire network and steal off data. They may even inject spyware to collect important data and release it to competitors.

Every company should once again think about where their cyber security strategy is taking them. They should invest more in it so they can protect themselves from such attacks.

The post The biggest cybersecurity threats to businesses appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/biggest-cybersecurity-threats-businesses/
via The Cyber Security Portal

Uber Didn’t Track Users Who Deleted the App, But It Still Broke the Rules

Uber Didn’t Track Users Who Deleted the App, But It Still Broke the Rules
Uber took a known industry practice and managed to turn it into something deeply suspicious. The post Uber Didn't Track Users Who Deleted the App, But It Still Broke the Rules appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/uber-didnt-track-users-deleted-app-still-broke-rules/

How to Stop Services Like Unroll.me From Snooping on Your Gmail

How to Stop Services Like Unroll.me From Snooping on Your Gmail
By now you've probably let lots of services and apps into your Gmail and more. Time for some spring cleaning. The post How to Stop Services Like Unroll.me From Snooping on Your Gmail appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/stop-services-like-unroll-snooping-gmail/

Just a Pair of These $11 Radio Gadgets Can Steal a Car

Just a Pair of These $11 Radio Gadgets Can Steal a Car
A technique that allows thieves to silently unlock and drive away cars is getting cheaper and easier than ever. The post Just a Pair of These $11 Radio Gadgets Can Steal a Car appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/just-pair-11-radio-gadgets-can-steal-car/

Tuesday, April 25, 2017

An important shift in Microsoft’s email hygiene approach

In an interesting shift, it seems Microsoft is getting out of the on-premises email filtering business.

from SweetTech http://feedproxy.google.com/~r/TalkTechToMe-All/~3/ANqxoTpVooE/

Worlds First Container Based Cybersecurity platform released

world’s first container based cybersecurity platform

tuCloud Federal Inc. announced today that they have launched the world’s first-ever container based cyber security platform. It is designed to physically set the web browsing activity aside from others which will help protect users from dangerous internet threats like malware and viruses.

The new platform is called Safeweb Engine and is a physical isolation platform which was built with help from Sandia National Laboratory. It is based on the proven safe web model that was originally developed by the same company.

The safeweb engine can be installed on a cloud, virtual and physical servers.

Read more details 

The post Worlds First Container Based Cybersecurity platform released appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/worlds-first-container-based-cybersecurity-platform-released/
via The Cyber Security Portal

KPMG Is Going To Hold A Cyber Security Conference

Cyber Security conference to be held by KPMG

In order to educate and spread awareness of cyber security for organizations asking them to build a more resilient system that would fight back cyber risks, KPMG is going to hold a conference.

The conference will be aimed at discussing various cyber security subjects. It will also shed light on how cyber security affects organization when technology fails due to shortcomings in their cyber security strategy.

Cyber security has already been started taken seriously by developing countries, so it should also become a part of countries that are underdeveloped to prepare for future.

Read more details

The post KPMG Is Going To Hold A Cyber Security Conference appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/kpmg-going-hold-cyber-security-conference/
via The Cyber Security Portal

Game On - International TableTop Day 2017

With International TableTop Day happening on the 29th April Adam's got some players around his table. Dave Salisbury founded Fanboy3, one of the UK's oldest play spaces, Ivan van Norman from Geek and Sundry is the organiser of this year's event and Matt Jarvis is the Editor of Tabletop Gaming magazine.

from SweetTech http://www.bbc.co.uk/programmes/p0511qfx

Sunday, April 23, 2017

All About the US Missile Defense That’ll Protect South Korea—And Tick Off China

All About the US Missile Defense That’ll Protect South Korea—And Tick Off China
As South Korea builds up its missile defense, China keeps a close eye. The post All About the US Missile Defense That’ll Protect South Korea---And Tick Off China appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/missile-defense-will-protect-south-korea-make-china-nervous/

What Has F8 in Store for Me?

What Has F8 in Store for Me?
Facebook showed off some nutty new tech this week at its annual developer conference. We unpack it with special guest Cade Metz. The post What Has F8 in Store for Me? appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/gadget-lab-podcast-313/

How to Set Up a Room in Your Home Just for VR

How to Set Up a Room in Your Home Just for VR
You arranged your TV room so you can sit around in comfort. Now, prepare your virtual-reality space. The post How to Set Up a Room in Your Home Just for VR appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/how-to-make-a-vr-room/

Make Movie Night a Blockbuster With This Fully-Loaded TV Room

Make Movie Night a Blockbuster With This Fully-Loaded TV Room
Upgrade your den of infinite diversion with the right gear and you'll forget what a movie theater even is. The post Make Movie Night a Blockbuster With This Fully-Loaded TV Room appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/best-home-theater-gear/

Let There Be Light: 2 Killer Projectors for Your Home Theater

Let There Be Light: 2 Killer Projectors for Your Home Theater
The latest TVs are gorgeously slim. But a richly colored layer of photons is downright ethereal. The post Let There Be Light: 2 Killer Projectors for Your Home Theater appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/best-tv-projectors/

Review: Fitbit Alta HR

Review: Fitbit Alta HR
The Alta HR offers a way to log all of your fitness fundamentals without much fuss, with the addition of a heart rate monitor to give you extra data. The post Review: Fitbit Alta HR appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/review-fitbit-alta-hr/

Saturday, April 22, 2017

Security News This Week: A Coachella Smartphone Thief Forgot About ‘Find My iPhone’

Security News This Week: A Coachella Smartphone Thief Forgot About ‘Find My iPhone’
Each weekend we round up the news stories that we didn't break or cover in depth but that still deserve your attention. The post Security News This Week: A Coachella Smartphone Thief Forgot About 'Find My iPhone' appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/security-news-week-coachella-smartphone-thief-forgot-find-iphone/

Want to Stop Facebook Violence? You Won’t Like the Choices

Want to Stop Facebook Violence? You Won’t Like the Choices
No one wants murder videos on Facebook. But no one wants Facebook to censor their baby videos, either. The post Want to Stop Facebook Violence? You Won't Like the Choices appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/face-law-cant-keep-violence-off-facebook-either/

Friday, April 21, 2017

Encrypted Chat Took Over. Let’s Encrypt Calls, Too

Encrypted Chat Took Over. Let’s Encrypt Calls, Too
Encrypted calling is tricky to get right, but that's changing fast. The post Encrypted Chat Took Over. Let’s Encrypt Calls, Too appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/encrypted-chat-took-now-encrypted-callings-turn/

The US Charging Julian Assange Could Put Press Freedom on Trial

The US Charging Julian Assange Could Put Press Freedom on Trial
No matter your feelings on Assange or WikiLeaks, espionage charges against the group would represent a serious blow to press freedom. The post The US Charging Julian Assange Could Put Press Freedom on Trial appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/us-charging-julian-assange-put-press-freedom-trial/

A New Way to Securely Send Information to WIRED

A New Way to Securely Send Information to WIRED
Announcing WIRED's new installation of SecureDrop, a better way to securely send us sensitive tips and leaks. The post A New Way to Securely Send Information to WIRED appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/new-way-securely-send-information-wired/

Use These 5 Top VPNs To Browse The Internet Anonymously

top 5 VPNs to secure your browser

In today’s life, the internet has become quite a necessity. While the internet offers us countless benefits, it also has its drawbacks. The Internet is also used by criminals to target innocent people and take away their information and use it for their own personal gains.

Although there are tons of ways you can prevent cyber criminals to take away your important information, the best way is to stay anonymous over the internet especially if you have tons of important data lying in your computer/device.

Staying anonymous on the internet isn’t hard. All you need is a virtual private network which will hide away your true identity and will make it impossible for the hackers to access your private data.

We have listed down top 5 VPNs that you can trust with a blind eye.

HotSpot Shield Elite Plus

Hotspot shield elite plus makes sure your chances of becoming a victim of internet theft is reduced. Your data is completely encrypted and secured through the private network that Hotspot sets up for you. The best thing about this VPN is that you can use it simultaneously over various devices without paying an extra penny.

VPN Unlimited

VPN unlimited sets itself apart by offering you a very fast server and even faster server switching. You can switch your server with a single click to shade away from your IP address. This VPN is great if you are using it on a mobile device.

Pure VPN

Pure VPN is perhaps the most trusted VPN service out there. Millions of people are using it as you read this post. It is known for offering very high-end encryption that will protect your system effectively from cyber criminals. Plus you can attach up to five devices on it through a single subscription. The VPN supports a host of different devices ranging from mobiles to gaming consoles.

ZenVPN

ZenVPN makes our list of top 5 VPNs because of the number of servers it offers. ZenVPN will give you 34 locations worldwide that you can switch with a single click. They are constantly adding more and more locations as time passes by.

TigerVPN

TigerVPN is the only VPN from this list that offers military-level end to end encryption for your MAC, Windows, iOS or Android. It has fewer servers across the world but has the highest level of security from these VPNs.

The post Use These 5 Top VPNs To Browse The Internet Anonymously appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/use-5-top-vpns-browse-internet-anonymously/
via The Cyber Security Portal

Thursday, April 20, 2017

Fevzi Turkalp from GadgetDetective.com answers 5Live listeners’ technology questions

From smartphones & tablets, to dealing with malware & protecting your privacy, our resident expert, Fevzi Turkalp has all the tech advice you need to choose the best tech for your needs & keep your existing gadgets running smoothly. In this week’s tech phone-in, Fevzi advises listeners on… • Password management software • Microwave ovens interfering with Bluetooth audio • Choosing a smartphone • Choosing speakers for use with the Amazon Echo Dot • What to do if someone has remotely accessed your computer • Choosing a suitable drive for doing backups • Getting various video files to playback on your computer • Choosing the best TV streaming box for your needs • Recovering deleted/lost data from your hard drive • Choosing an affordable laptop • and much more…. The Tech phone-in is broadcast live on BBC Radio 5Live on the 1st and 3rd Friday of every month, from 2am to 3am. You can follow Fevzi on Twitter @GadgetDetective

from SweetTech http://www.bbc.co.uk/programmes/p050nxyz

Sony’s New Mirrorless Camera Is Its Most Beastly Shooter Yet

Sony’s New Mirrorless Camera Is Its Most Beastly Shooter Yet
Sony keeps rocking the mirrorless world. The post Sony's New Mirrorless Camera Is Its Most Beastly Shooter Yet appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/sony-alpha-a9/

A Seemingly Simple Tweak Unlocks Google Home’s Full Potential

A Seemingly Simple Tweak Unlocks Google Home’s Full Potential
Starting today, your Google Home device will be able to identify up to six distinct voices. That's a big deal. The post A Seemingly Simple Tweak Unlocks Google Home’s Full Potential appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/google-home-multiple-accounts/

Facebook Just Handed Out Thousands of 360 Cameras. We’ve Got a Review

Facebook Just Handed Out Thousands of 360 Cameras. We’ve Got a Review
The Giroptic iO 360 camera was just given out to four thousand attendees at Facebook F8. A flood of spherical selfies will soon hit the web. The post Facebook Just Handed Out Thousands of 360 Cameras. We've Got a Review appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/giroptic-io-360-camera-review/

In Facebook’s Future, You Live Through Your Phone

In Facebook’s Future, You Live Through Your Phone
At today's Facebook F8 conference, Mark Zuckerberg detailed a mobile-first AR future that may not pan out. The post In Facebook's Future, You Live Through Your Phone appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/facebooks-future-live-phone/

Here’s Everything Facebook Announced at F8, From VR to Bots

Here’s Everything Facebook Announced at F8, From VR to Bots
Augmented reality, Messenger upgrades, and more. The post Here's Everything Facebook Announced at F8, From VR to Bots appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/everything-facebook-announced-at-f8/

Facebook Messenger’s Plot to Be the Only App You Ever Need

Facebook Messenger’s Plot to Be the Only App You Ever Need
New features aim to make Messenger the place you talk to your friends and the place you stay to do everything else. The post Facebook Messenger's Plot to Be the Only App You Ever Need appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/facebook-messengers-plot-app-ever-need/

Samsung Galaxy S8 First Impressions: That Screen, You Guys

Samsung Galaxy S8 First Impressions: That Screen, You Guys
There's a lot of software inside Samsung's new smartphone. But the real story, for once, is the thing itself. The post Samsung Galaxy S8 First Impressions: That Screen, You Guys appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/samsung-galaxy-s8-hands-on/

How to Watch Facebook F8

How to Watch Facebook F8
Facebook's big F8 gathering takes place Tuesday and Wednesday, and you can watch the whole thing online. The post How to Watch Facebook F8 appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/how-to-watch-facebook-f8/

Rhode Island Hires First State Cybersecurity Officer

Rhode island’s first ever state cyber security officer

Rhode Island has just hired its first state Cybersecurity officer. Mike Steinmetz will be serving as Gov. Gina M. Raimondo’s policy advisor on cyber security. He will also help develop a comprehensive state cybersecurity strategy that will help the state fight back cyber crimes and prevent them.

Steinmetz will also be serving as Rhode Island’s homeland security adviser. He began working on April 17.

Raimondo made this decision as a part of continuing efforts to create economic development and increase innovation. The decision was also made based on the series of 8 different recommendations in a report that was released in 2015 from the cybersecurity commission of Rhode Island.

Read more details 

The post Rhode Island Hires First State Cybersecurity Officer appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/rhode-island-hires-first-state-cybersecurity-officer/
via The Cyber Security Portal

Delta Risk has been named in top 25 cyber security companies

Delta risk recognized as the top 25 best cybersecurity companies

Delta Risk is a global provider of risk management and cyber security services. The company announced today that it has been included in the list that recognizes top cyber security companies of 2017. They were selected to be in the top 25 companies by CIO Applications.

CIO Applications judges companies based on the evaluation of their ability to help government and commercial entities in the entire world to build advanced risk management capabilities and cyber defense.

The list of these companies are released every year and is selected by a panel of various experts from the cyber security industry and CIO applications editorial team.

Read more details 

The post Delta Risk has been named in top 25 cyber security companies appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/delta-risk-named-top-25-cyber-security-companies/
via The Cyber Security Portal

Wednesday, April 19, 2017

Is your Content Management System putting you at risk?

Choosing a CMS involves consideration of the functionalities and features you need – but be sure you don’t overlook one of the most important aspects of any web-based software or service: security.

from SweetTech http://feedproxy.google.com/~r/TalkTechToMe-All/~3/xN_9MW1LFZM/

North Korea’s Failed Missile Launch Eases Experts’ Worst-Case Scenario Fears

North Korea’s Failed Missile Launch Eases Experts’ Worst-Case Scenario Fears
Rather than showing off North Korea's military might, as intended, the country's most recent failed launch put observers at relative ease. The post North Korea’s Failed Missile Launch Eases Experts' Worst-Case Scenario Fears appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/north-koreas-failed-rocket-test-eases-experts-worst-case-scenario-fears/

Tuesday, April 18, 2017

Facebook Offers a Better Way to Get Back Into Your Locked-Out Apps

Facebook Offers a Better Way to Get Back Into Your Locked-Out Apps
At Facebook's F8 conference, the company outlined a refreshing alternative to the bad security questions that plague account recovery across the web. The post Facebook Offers a Better Way to Get Back Into Your Locked-Out Apps appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/facebook-offers-better-way-get-back-locked-apps/

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure
When a phishing attack can impersonate a trusted site it's even harder to know that it's happening. The post Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure appeared first on WIRED.

from SweetTech https://www.wired.com/2017/04/sneaky-exploit-allows-phishing-attacks-sites-look-secure/