UK Unveils New Cyber Flashing Law

UK Unveils New Cyber Flashing Law

Lawmakers in the United Kingdom have made it a criminal offense to use a cell phone, dating app or social media to send unsolicited sexual images – a practice known as cyber flashing. Under the terms of the United Kingdom’s new Online Safety Bill, individuals convicted of sharing an image or video of a person’s genitals for their own sexual gratification, or to cause another person humiliation, alarm or distress, could spend up to two years in…

Read More

Exclusive: iboss Issues School District Cybersecurity Warning

Exclusive: iboss Issues School District Cybersecurity Warning

K-12 schools in the United States may have a “startlingly low understanding of growing cybersecurity risks,” according to new research by Zero Trust Edge cloud security provider iboss.  The company teamed up with national education nonprofit organization Project Tomorrow to survey nearly 600 district administrators and technology leaders from school districts across the United States between January and May 2021. According to iboss, the resulting report “should serve as a wakeup call for districts and parents, as cybersecurity incidents at…

Read More

Randomized and Changing MAC (RCM) – Cisco Blogs

Randomized and Changing MAC (RCM) – Cisco Blogs

What is Randomized & Changing MAC (RCM) Historically wireless clients associate to the wireless network using the manufacturer assigned mac address that is associated with the wireless network interface card (NIC). This manufacturer-assigned mac address, which is globally unique, is also known as burn-in address (BIA). Use of this burn-in address everywhere raises the question of end-user privacy as the end-user can be tracked with WIFI’s mac address. In this document, this will be referred…

Read More

Critical infrastructure now required to report cyber incidents to CISA

Critical infrastructure now required to report cyber incidents to CISA

Critical infrastructure now required to report cyber incidents to CISA | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How to Move from Real-Time Data to Real-Time Decisions

How to Move from Real-Time Data to Real-Time Decisions

By Cori Land, Corporate Strategist, DataStax In How to Measure Anything, Douglas Hubbard offers an alternative definition of “measurement” to the Oxford English Dictionary’s “the size, length, or amount of something.” Hubbard defines measurement as:  “A quantitatively expressed reduction of uncertainty based on one or more observations.” This acknowledges that the purpose of measurement is to reduce uncertainty. And the purpose of reducing uncertainty is to make better decisions. Decisions are often made under some…

Read More

Top eight cybersecurity predictions for 2022

Top eight cybersecurity predictions for 2022

Top eight cybersecurity predictions for 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Helping Mom & Dad: Online Doctor Visits and Telemedicine

Helping Mom & Dad: Online Doctor Visits and Telemedicine

Whether it’s for routine care, a prescription refill, or a simple follow-up, online doctor visits offer tremendous benefits in terms of both convenience and ease of care—all good reasons to help mom and dad get connected with it. There’s no doubt that more older adults than ever are taking advantage of online doctor visits, more formally known as telemedicine. While usage numbers have risen dramatically across all age groups, it’s particularly so for elders. Pre-…

Read More

How video surveillance bolsters hotel security

How video surveillance bolsters hotel security

How video surveillance bolsters hotel security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Historic Opportunity to Modernize and Secure Smart Water Operations

Historic Opportunity to Modernize and Secure Smart Water Operations

Reducing costs and downtime while increasing efficiencies are key benefits of implementing a Smart Water approach. But aging SCADA systems and security are often a hurdle to doing so. Add to that, funding limitations or a skills gap among workers, and operators of water utilities may decide to delay modernization. Thanks to the U.S. bi-partisan Infrastructure Investment and Jobs Act (IIJA) there is a unique opportunity to address these areas of critical infrastructure by digitizing…

Read More

Alert system protects healthcare staff from violence

Alert system protects healthcare staff from violence

Alert system protects healthcare staff from violence | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 3,178 3,179 3,180 3,181 3,182 4,082