logoSign upLog in
Cybersecurity - beBee


~ 100 buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  1. George Touryliov
    2017 is nearly upon us, so here are ITProPortal #cyber #security #predictions for the upcoming year.
    George Touryliov
    2017 cyber security for businesses predictions
    www.itproportal.com 2017 is nearly upon us, so here are our cyber security predictions for the upcoming...
  2. George Touryliov
    What is the current state of your organisation’s cyber security? Could it be time to conduct a thorough check on the health of your cyber defences, on your contingency plans in the face of cyber attacks and your overall cyber risk?
    George Touryliov
    Cyber fit and healthy: Are you ready for 2017?
    www.itproportal.com Have you cyber 'health-checked' your organisation? Why should you do this? How do you do...
  3. George Touryliov
    The following are some of the highlights of the new law -
    George Touryliov
    6 highlights of China’s new cyber security law
    www.itproportal.com The long-awaited Cyber security Law of China was finally passed at the National People’s Congress of China on November...
  4. George Touryliov
    This deal is said to create the largest consumer security business in the world with more than $2.3 billion in revenue a year according to the last fiscal year earnings of Symantec and LifeLock.
    George Touryliov
    Symantec To Buy LifeLock for $2.3 Billion
    socialbarrel.com Symantec is known as one of the largest online security companies in the world. Recently, the company is reported to buy LifeLock Inc, which is an identity theft protection...
  5. ProducerCarol Evenson

    Carol Evenson

    Protecting Big Data for Your Company
    Protecting Big Data for Your CompanyWith the growing demand for big data comes the growing demand to secure it. Network solutions such as firewalls or employee security awareness are still valid, but traditional database solutions such as permission levels or encryption are much less...
  6. Gonzalo Meza

    Gonzalo Meza

    By its very nature, computer code is astonishingly hard to audit and proof against backdoors, unwanted functionality and malicious acts by your own engineers.
    Gonzalo Meza
    How I sent my boss to jail
    ubm.io What's in the code? Does the boss have any...
  7. Gonzalo Meza

    Gonzalo Meza

    Nuclear C&C shaped the way the internet works in ways most experts know nothing about...
    Gonzalo Meza
    The Secret Nuclear History of Cat Videos
    motherboard.vice.com Behind every Rickroll is a technology designed at the height of the Cold War to guarantee nuclear...


    Joanna Hofman
    11/07/2016 #1 Joanna Hofman
    Interesting article, Gonzalo Meza. I learnt few new things. Thank you.
  8. Nicole Chardenet
    ...And, it's extremely hard to detect. Oh yay. Thank you, chip manufacturers. NOT.
    Nicole Chardenet
    This ‘Demonically Clever’ Backdoor Hides In a Tiny Slice of a Computer Chip
    www.wired.com Researchers have built a proof-of-concept processor that uses secretly stored electrical charge to trigger an ultra-stealthy...


    Gonzalo Meza
    06/06/2016 #2 Gonzalo Meza
    Are your computers / smartphones / devices compromised? Probably.
    eric nixon
    05/06/2016 #1 eric nixon
    Probably why US DoD makes chips for mission sensitive programs domestically. I believe DARPA considered this more than 10 yrs ago when PRCA attempted to bring corrupted chips in the country in electronic pic frames
  9. ProducerPhil Friedman

    Phil Friedman

    Not All Clouds Have a Silver Lining
    Not All Clouds Have a Silver LiningCLOUD-BASED SYSTEMS ARE ATTRACTIVE FOR SMALL BUSINESSES, BUT THEY CAN BE THE WRONG CHOICE...I am not an IT person. I am, however, an experienced small-businessman and consultant, with considerable experience in purchasing, implementing, and using...


    Phil Friedman
    26/05/2016 #13 Phil Friedman
    #12 @ @Franci Eugenia Hoffman - That is true. But even if we ignore the risk involved in having some other than yourself hold important and sensitive data on your behalf, we need to understand that cloud-based computing will continue to fail at times when a robust internet connection is not available -- for example, most of the time while flying on a commercial airliner. To my mind, the situation with cloud-based computing is the usual one of marketing people running way out ahead of real-world fulfillment. Thank you for reading and commenting. Cheers!
    Franci Eugenia Hoffman
    26/05/2016 #12 Franci Eugenia Hoffman
    My thoughts on Cloud-based computing is I don't like putting all of my eggs in one basket, especially if I am renting the basket.
    Phil Friedman
    25/05/2016 #11 Phil Friedman
    #6 @ @Paul "Pablo" Croubalian - I sympathize with what you're saying -- as someone whose mission is to be critical :-) Thank you for reading and commenting. Cheers!
    Phil Friedman
    25/05/2016 #10 Phil Friedman
    #7 @ @Pamela L. Williams - Yes, those of us who travel a lot know well the travails (travailia?) of cloud computing. If I were to rely entirely on cloud-based computing, every time I fly to Taiwan, I would lose more than a day's potential working time while in-flight. And BTW,don't believe for a minute that the airlines actually provide in-flight internet service. In my experience, fewer than 50% of planes have been fitted with the equipment, and of those which have, fewer that 20% of those are actually functional -- never mind the exorbitant fees for using it. Thank you for reading and commenting. Cheers!
    Phil Friedman
    25/05/2016 #9 Phil Friedman
    #4 @ John Williams - I have no doubt that some people will find cloud-based computing satisfactory from an operational standpoint. But I doubt they are in areas of the world without reliable and robust internet services. And I doubt that such persons travel much. Security is another matter entirely, but of equal concern. Thank you for reading and commenting.
    Phil Friedman
    25/05/2016 #8 Phil Friedman
    #5 @Donna-Luisa Eversley - This is not a technical issue. It is simply the case that that universal, reliable, and robust WiFi and internet service does not yet exist. So if you base all your programs and data in "The Cloud", there will be times that you will be unable to work or access those programs and data files. My recommended approach for most small-business is to 1) work only with software that keeps a functioning copy on your local drive, 2) keep your critical current working files on a local drive or auxiliary drive, and 3) keep a mirror of your data files in the Cloud (which mirror is synced at regular intervals with your local files). Thank you for reading and commenting.
    Pamela L. Williams
    25/05/2016 #7 Pamela L. Williams
    Makes 100% sense @Phil Friedman, and there is also the caveat of public access. At one company I worked for it disallowed accessing the internet on company owned laptops if the source was public. That immediately ruled out airports, Starbucks, or any other public WiFi. I tried to do some urgent 'updates' from a hotel while on vacation and ended up having to call and walk a teammate through the fixes because the laptop wouldn't allow me to access the company system or the cloud. Secure; yes. Conducive to working on the road, No.
    Paul "Pablo" Croubalian
    25/05/2016 #6 Paul "Pablo" Croubalian
    I have a phobia against building on rented land. I do use the cloud for many things, but none of them are "mission-critical." (Sorry, for the use of an over-used phrase).
    Donna-Luisa Eversley
    25/05/2016 #5 Donna-Luisa Eversley
    @Phil Friedman great obsevations.The biggest challenge for entrepreneurs with cloud computing storage is access and integration when you need it ...as internet access is never always foolproof. As secondary storage i think its great. For small businesses and entrepreneurs it may be best to really evaluate backup options, because it can be an embarrassing situation. I can recall years ago launching an interactive website and visiting customers trying to illustrate how easy access was on tablet, mobile, and computer... well , that day there was a problem with access in the area...something happened to a cell tower and we could not get online. To make the time valuable, i thought to review offline some information with client and had no access to get in...

    @Shubhanshu Garg...can you share your expertise in this area with us please :-)
    John Williams
    25/05/2016 #4 John Williams
    Interesting, I used to find cloud computing just fine until I read this. Cybersecurity is also another topic to take into consideration.
    Phil Friedman
    25/05/2016 #3 Phil Friedman
    Thank you, Pascal, for reading and sharing this post. Cheers!
    Phil Friedman
    25/05/2016 #2 Phil Friedman
    Thank you, Catalina, for sharing this post
    Phil Friedman
    25/05/2016 #1 Phil Friedman
    Thanks, @Matt Sweetwood for sharing this post. Cheers!