Why companies should use AI to fight cyberattacks

Why companies should use AI to fight cyberattacks

Cyberattackers use artificial intelligence, so why not apply it as a defense? One expert explains why AI can take your cybersecurity to the next level of protection. Image: iStockPhoto/maxkabakov In any debate, there are always at least two sides. That reasoning also applies to whether or not it is a good idea to use artificial intelligence technology to try stemming the advantages of cybercriminals who are already using AI to improve their success ratio.  SEE:…

Read More

DARPA Announces SMOKE Program

DARPA Announces SMOKE Program

US military network-security researchers have launched a new program to discover more about the tactics of malicious hackers. The Signature Management Using Operational Knowledge and Environments (SMOKE) program was announced on Tuesday in a broad agency statement put out by officials at the US Defense Advanced Research Projects Agency (DARPA) in Arlington, Virginia. Signatures are patterns that describe the way in which an organization performs cyber operations. SMOKE is asking the computer industry to develop methods…

Read More

New tech for the holidays? Watch out for these tech support scams.

New tech for the holidays? Watch out for these tech support scams.

We all know the frustration. A new piece of tech isn’t working the way it should. Or maybe setting it up is simply turning into a royal pain. Grrr, right? Just make sure that when you go on the hunt for some help, you don’t let a tech support scam get the better of you.   Like so many scams out there, tech support scams play on people’s emotions. Specifically, the frustration you feel when things don’t work right. You want that problem fixed right now. So much so that you may not pay close enough…

Read More

New tech for the holidays? Watch out for these tech support scams.

New tech for the holidays? Watch out for these tech support scams.

We all know the frustration. A new piece of tech isn’t working the way it should. Or maybe setting it up is simply turning into a royal pain. Grrr, right? Just make sure that when you go on the hunt for some help, you don’t let a tech support scam get the better of you.   Like so many scams out there, tech support scams play on people’s emotions. Specifically, the frustration you feel when things don’t work right. You want that problem fixed right now. So much so that you may not pay close enough…

Read More

Maryland stadium tests weapon detection system

Maryland stadium tests weapon detection system

Maryland stadium tests weapon detection system | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

How to protect your business and its data during the 2021 holiday season

How to protect your business and its data during the 2021 holiday season

It’s the first year of major holiday travel in the post-pandemic remote work world. Here’s what businesses can do to protect themselves from elevated holiday cybersecurity risks. Say ho-ho-no to holiday cybercriminals. Image: Shutterstock/Zephyr_p It’s late 2021, and we may not be in the post-pandemic winter wonderland we had hoped for, but holiday travel still isn’t off the table in the same way it was last year. That said, while most of us are gearing…

Read More

Most Phishing Pages are Short-lived

Most Phishing Pages are Short-lived

The lifespan of most phishing pages is as brief as that of an adult mayfly, according to new research by cybersecurity company Kaspersky. Between July 19 and August 2, 2021, researchers analyzed 5,307 examples of phishing pages. They found that within 13 hours of monitoring commencing, a quarter of all pages had become inactive. A sizable chunk of links (1,784) ceased functioning after the first day of monitoring, and half of the phishing pages included in the…

Read More

How to restrict server users to a specific directory in Linux

How to restrict server users to a specific directory in Linux

Need to lock down that Linux server so certain remote users can only access a specific directory and only for file upload and download purposes? Jack Wallen shows you how. Image: Production Perig/Shutterstock When you have a server with SSH access, unless you’ve configured it otherwise, any user with an account on that system can log in and, if they have the permissions and skill, wreak havoc on your server. SEE: 40+ open source and…

Read More

Define value across your technology platform: Use Business, Technical & Risk measures to map value (Part 5)

Define value across your technology platform: Use Business, Technical & Risk measures to map value (Part 5)

“Considering an infrastructure refresh in data center consolidation, edge deployment, or compute refresh and consolidation? Today’s decision-making requires analysis, vision, calibration, and foresight for the next request from the business. For successful organizations and leaders, this requires a review of success factors for Business, Technical and Compliance / Risk goals” This is part five in a five-part series for organizations considering a refresh of compute infrastructure, moving, or migrating to the cloud or application consolidation….

Read More

2021 marks another record year for security vulnerabilities

2021 marks another record year for security vulnerabilities

The number of new security flaws recorded by NIST has already surpassed the total for 2020, the fifth record-breaking year in a row. Image: iStock/weerapatkiatdumrong Patching security flaws is a challenging and seemingly never-ending chore for IT and security professionals. And that chore gets even more difficult each year as the number of new security vulnerabilities continues to rise. Based on the latest stats from the National Institute of Standards and Technology Vulnerability Database, the…

Read More
1 3,145 3,146 3,147 3,148 3,149 3,823