Security

Security Awareness: The Next Hot Field?

Posted In Data
shutterstock_161764403
According to recent reports from Symantec and Verizon, user mistakes were responsible for most of the successful cyberattacks that occurred last year. The Verizon report claims that more than two-thirds of the 290 electronic espionage cases it learned about in 2014 involved phishing; Symantec’s report found that phishing attacks are proving so successful that even sophisticated state-sponsored spies rely on it. And the FBI calls phishing the most vulnerable attack vector in cybersecurity. Because IT security departments have made tremendous… continue…

Entering the (Growing) Healthcare-Privacy Field

Posted In Data, Looking in Tech
shutterstock_211464964
Healthcare privacy experts are in demand, and a tech pro with strong analytical and interpersonal skills has the potential to cross industries and enter the healthcare field. No transition is without its challenges, however. For starters, most positions related to healthcare privacy require you become HIPAA-certified in data privacy and security. But considering the growing need in a booming industry, the time and effort necessary to lock down such a certification could be worth it. Operations and Processes The role… continue…

Rising Cyberattacks Mean Opportunity for Security Pros

Posted In Data, Living in Tech
Symantec
The Web can be a dangerous place: According to the latest annual “Internet Security Threat Report” from Symantec (PDF; registration required), sophisticated attacks such as highly targeted spear-phishing are on the rise, and often aimed at small- to medium-sized businesses that may not be able to afford the advanced IT security of enterprises. (Of course, the past few years have demonstrated that not even enterprises are immune from devastating cyberattacks.) Symantec has seen advanced attackers do everything from building custom… continue…

DC Is Desperate for STEM, Cybersecurity Pros

shutterstock_Orhan Cam
What’s New This Quarter Tech employment in the Washington, D.C. metro area continues to flourish, according to most sources. “We tend to see the market pick up during the first quarter of the year,” said Jennifer Selden, a recruiting director for Randstad Technologies. “This is the time when many companies’ annual budgets are approved and implemented, and any hiring freezes from the prior year are lifted.” That buoyancy extends to the public sector. Take the FBI, for example: Desperate for… continue…

Post-Snowden, Americans Leery on Web Privacy

Posted In Data, Living in Tech
Pew Research Center Survey
The Edward Snowden revelations about the extent of the U.S. government’s electronic surveillance are no longer breaking news, which means it’s time to see whether those disclosures had a long-term effect on how Americans perceive their privacy, and how they protect their data online. Fortunately, some new survey data from the Pew Research Center provides insight into those very questions. While a majority of Americans (9 in 10) have heard about the U.S. government’s extensive surveillance programs, only a third… continue…

Meet BlackBerry’s $2,360 Tablet

Posted In Living in Tech, Mobile
Screen Shot 2015-03-16 at 11.34.55 AM
BlackBerry is getting back into the tablet game with a $2,360 device that— Wait, what? That price wasn’t a typo: Even as the tablet market stagnates, and brands rush to price smartphones and tablets as low as possible, BlackBerry has decided to go ultra-ultra-ultra premium with its latest device. Why? Because the so-called SecuTablet is (supposedly) secure enough for a broad range of government and enterprise work. In terms of hardware, the SecuTablet is a modified Samsung Galaxy Tab S… continue…

Interview Tips for Data Security Analysts

Posted In Data, Looking in Tech
shutterstock_Maksim Kabakou
It’s easy to argue that the most significant issue facing technology today is the security of online data. As demonstrated by recent mega-breaches, IT security pros can barely keep up with increasingly sophisticated threats, and the need for talent with a solid security skill set is therefore great. The security field needs critical thinkers, not just candidates with good resumes. These top-notch practitioners want to know “why” something happened, not just “how,” and they’re not always comfortable following a list… continue…

Getting Rid of Lenovo’s Superfish Vulnerability

Posted In Data, Living in Tech
SuperFish
As you may have heard by this point, Lenovo loaded an adware package called Superfish Visual Discovery onto many of its devices. Annoying? Absolutely: Nobody likes an add-on that inserts sponsored links into your search results. But Superfish became downright dangerous when security researchers realized it could easily double as a handy tool for a man-in-the-middle attack, thanks to its ability to always appear as a “Trusted Party” to websites. The revelations have left Lenovo scrambling to repair the damage.… continue…

10 Reasons Why You Need a Cybersecurity Plan

Posted In Data
shutterstock_Sergey Nivens
Over the past year, we’ve witnessed all the hype surrounding cybersecurity finally transform into a frightening new reality, one where corporate and government organizations seem helpless to stop cyberincursions. No need to list statistics or polls anymore to try to quantify the threat: Cyberattacks have become nonstop headline news. The transformation from perceived threat to actual headlines has occurred for the following reasons: Hacking, cracking and other forms of cybermischief have reached a level of sophistication equaling (and in many… continue…

Auto-Deleting Emails: The Next Hot Feature?

Posted In Data
shutterstock_Trybex
The ability to archive and search through email is a valuable business tool: Who hasn’t cycled back through a year’s worth of messages to find an important piece of data? But email, despite all its obvious value, also has a downside: If unauthorized users gain access to the server holding all those messages, they can quickly learn your secrets. Just look at what happened to Sony after a few determined hackers penetrated its IT security: Not only did a trove… continue…