logoSign upLog in
Cybersecurity - beBee

Cybersecurity

6K buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Threats: Social Engineering and Malicious Spam Dominate
    www.bankinfosecurity.com Good news: Exploits kits are in decline, thanks to concerted efforts to disrupt their efficacy. Unfortunately, criminals are diversifying their attacks,...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Trump’s Cybersecurity Executive Order Under Fire
    threatpost.com Former AT&T CSO, Ed Amoroso, says government needs to shift from talk to action when it comes to...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Why So Many Top Hackers Hail from Russia — Krebs on Security
    krebsonsecurity.com
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #Malvertising, #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    This malvertising campaign infected PCs with ransomware without users even clicking a link | ZDNet
    www.zdnet.com Users only needed to visit a website compromised with a malicious advert to become infected with Mole ransomware, warn security...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #NIST, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Why the NIST framework needs to be the common language of cybersecurity
    federalnewsradio.com The NIST cybersecurity framework gives everyone a basis to start in the same place when talking about protecting systems and...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #BreachNews, #CloudSec
    Jaime Contreras, MBA, CISM, CISA
    What You Need to Know About the Latest US Citizen Data Leak
    www.tripwire.com The disclosure of the 198 million records by a political data analytics firm isn’t a case of malicious hacking, but of...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #Stalkerware
    Jaime Contreras, MBA, CISM, CISA
    How to Spot and Remove Stalkerware
    fieldguide.gizmodo.com As if there aren’t enough tech security threats to worry about, you also need to be on your guard against so-called ‘stalkerware’—invasive programs installed by suspicious spouses, jealous exes or controlling parents without your knowledge. Here are...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Digital organizations face a huge cybersecurity skills gap
    venturebeat.com Over the past five years, organizations have become more aware of cybersecurity, and yet DDoS, spear-phishing attacks, botnets, and other attack vectors have continued to get worse. Digital insecurity will continue for the foreseeable future, with...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Credit Card Breach at Buckle Stores — Krebs on Security
    krebsonsecurity.com
    Relevant
  10. John Enright

    John Enright

    22/06/2017
    John Enright
    WannaCry: Why this ransomware just won't die | ZDNet
    www.zdnet.com As Honda and speed cameras in Austalia have found out, WannaCry is still capable of infecting networks and could be for years to come - here's...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #HealthIT
    Jaime Contreras, MBA, CISM, CISA
    Overcoming the Healthcare Cybersecurity Workforce Shortage
    healthitsecurity.com (ISC)2 released a survey showing how organizations are working to overcome the increasing healthcare cybersecurity workforce...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #NIST, #CyberSec, #RiskMgt
    Jaime Contreras, MBA, CISM, CISA
    How to Know Which NIST Framework to Use
    www.nextgov.com Some agencies are confusing NIST\'s Cybersecurity Framework with the Risk Management...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #Ransomware, #Malware
    Jaime Contreras, MBA, CISM, CISA
    This Ransomware Uses Pics of Sick Kids to Lure in Victims
    nymag.com Astoundingly immoral...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Restaurants Targeted By Malware: New Attack Goes Undetected By Antivirus Tools
    www.ibtimes.com A new attack directed at the computer systems of restaurants in the U.S. uses a technique that makes it difficult for antivirus tools to detect...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity — the new normal
    www.arabnews.com One of the most important legacies of the 20th century is the construction of the Internet and the creation of cyberspace.  As a network of millions of computers and their interconnections, the Internet already penetrates most, if not all, parts of...
    Relevant
  16. Producerpaul wayne

    paul wayne

    20/06/2017
    4th Annual Cyber Security Summit: DC & Region’s Official Cyber Hiring Event
    4th Annual Cyber Security Summit: DC & Region’s Official Cyber Hiring EventC-Suite & Senior Level Executives responsible for protecting their company's critical data are invited to attend the 4th annual Cyber Security Summit: DC. This is an exclusive conference connecting Information & Cyber Security Executives...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Successful Security? Stop Blaming Users
    www.bankinfosecurity.com To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Senior U.S. cybersecurity specialists made average of roughly $118K in Q1, researcher notes
    www.scmagazine.com The average salary of U.S. senior cybersecurity specialists in Q1 of 2017 was $118,887, according to research from David Foote, cyber analyst at Foote Partners LLP, in a presentation Monday at RiskSec Toronto...
    Relevant
  19. ProducerJohn Enright

    John Enright

    17/06/2017
    Here are the channels hackers can use to break into your IT infrastructure
    Here are the channels hackers can use to break into your IT infrastructureProtecting your...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Recruitment and retention of 'cyber ninjas' doesn't have to be a dark art, report says - Cyberscoop
    www.cyberscoop.com Large systems integrators turn out to be the government contractors best at recruiting and retaining a highly technically skilled cybersecurity...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #CyberRisk
    Jaime Contreras, MBA, CISM, CISA
    Even before cyber EO, U.S. Trade and Development Agency bakes in risk management
    federalnewsradio.com Benjamin Bergersen, CIO of the USTDA, said the agency uses a combination of NIST documents, FedRAMP information and other data to mitigate risk to...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #CyberRisk, #HealthIT
    Jaime Contreras, MBA, CISM, CISA
    Healthcare's Unique Cyber Risk Management Challenges | SecurityWeek.Com
    www.securityweek.com The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized assets among cyber...
    Relevant
  23. Jaime Contreras, MBA, CISM, CISA
    #Ransomware, #HealthIT
    Jaime Contreras, MBA, CISM, CISA
    4 ways hospitals can prevent a ransomware attack | FierceHealthcare
    www.fiercehealthcare.com ​​​​​​​Hospitals are a prime target for hackers, but providers can take steps to ensure their systems are better protected against ransomware and other cyberthreats. The federal government has taken steps on the national level to improve...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    www.forbes.com There's a need for a long-term investment model for managing modern risk via...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Your Information Isn't Being Hacked, It's Being Neglected
    www.darkreading.com To stop customer information from being compromised, we must shore up the most vulnerable parts first, the day-to-day IT operations work that builds, configures, and changes...
    Relevant
See all