logoSign upLog in
Cybersecurity - beBee

Cybersecurity

9K buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
Buzzes
  1. ProducerMerrill Cook

    Merrill Cook

    05/10/2017
    A Small Businesses' Guide to Internet Security [Infographic]
    A Small Businesses' Guide to Internet Security [Infographic]To those in the cyber security field, the stakes are well known. More than 1.5 million cyber security job openings were vacant last year, and this number is only set to grow. That's not because we aren't cranking out cyber security graduates,...
    Relevant
  2. ProducerJan 🐝 Barbosa
    Can We Surive An IOT Christmas Amidst A Pandemic Of Hacking? Featuring Katie King, MBA
    Can We Surive An IOT Christmas Amidst A Pandemic Of Hacking? Featuring Katie King, MBAWe are living in the age of the Internet Of Things , the age when an ever-expanding list of our devices collects and exchanges vast amounts of data (our very own personal data) that is willingly (or unknowingly) shared to the cloud where it is...
    Relevant

    Comments

    Larry Boyer, 🐝 Brand Ambassador
    05/10/2017 #6 Larry Boyer, 🐝 Brand Ambassador
    We need a lot more discussion about IoT security. The devices are cool, but few think about or are aware of the risks.
    Franci🐝Eugenia Hoffman, beBee Brand Ambassador
    05/10/2017 #5 Franci🐝Eugenia Hoffman, beBee Brand Ambassador
    This makes total sense @Jan 🐝 Barbosa. I love new technology but I don't care for total lack of control. I don't need my TV, phone, and computer to watch every move I make. I read an article a while back and the gist was you don't need to submit a resume to Google because they already know everything about you. So, Alexa and her friends, etc. do not need to be a part of my daily activities.

    There are advantages and disadvantages to technology. IMO, a few conveniences can become major inconveniences.
    Jan 🐝 Barbosa
    04/10/2017 #4 Jan 🐝 Barbosa
    #3 True Story !!!! @Kevin Baker
    Kevin Baker
    04/10/2017 #3 Kevin Baker
    Excellent advise. Prevention is far less stress then cure
  3. John Enright

    John Enright

    30/09/2017
    John Enright
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    What's causing so many data breaches and leaks? 7% of all Amazon S3 servers exposed online
    www.ibtimes.co.uk Experts reportedly uncovered that 35% of all S3 buckets were unencrypted, potentially leaving data under risk of...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards — Krebs on Security
    krebsonsecurity.com
    Relevant
  6. DrArt Trejo

    DrArt Trejo

    27/09/2017
    wow - who's next - Deloitte hit by cyber-attack revealing clients’ secret emails
    DrArt Trejo
    Deloitte hit by cyber-attack revealing clients’ secret emails
    www.theguardian.com Exclusive: hackers may have accessed usernames, passwords and personal details of top accountancy firm’s blue-chip...
    Relevant

    Comments

  7. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Malware strikes back hitting Facebook, healthcare and education hard - Computer Business Review
    www.cbronline.com Malware has surged in the second quarter of 2017 with a 67 per cent increase, driven by the prevalence of the Faceliker...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #BreachNews, #HealthIT
    Jaime Contreras, MBA, CISM, CISA
    Cyber attacks target healthcare and social media users - McAfee
    www.information-age.com The healthcare sector reported greatest number of security incidents in 2016 and 2017; while malicious apps manipulate social media...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #BreachNews, #CloudSec
    Jaime Contreras, MBA, CISM, CISA
    Leaking Cloud Databases and Servers Expose Over 1 Billion Records
    securityintelligence.com According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #HealthIT
    Jaime Contreras, MBA, CISM, CISA
    How 'the invisible network' poses a major security threat
    www.bbc.com Many firms have no idea how many devices are connected to their networks - a major cyber-security...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Too much data, too few workers, threaten many cybersecurity programs
    www.information-management.com Many organizations struggle with an overwhelming amount of threat information, coupled with a lack of staff expertise to analyze it, says Larry...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Report: Government among most targeted for web application attacks
    www.fifthdomain.com At 1,184 average attacks per day, government followed only the IT sector (1,346) as the most targeted industry for web application...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Doubling Down: Locky and FakeGlobe ransomware pushed in dual spam campaigns
    www.scmagazine.com Cybercriminals kicked off a spam campaign earlier this month capable of delivering either Locky or FakeGlobe ransomware creating a situation where a single person could be victimized twice in the same...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Making it big in cyber security
    www.techradar.com Get the skills you need to thrive in the demanding world of information...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #NIST
    www.csoonline.com Updating the content of NIST 800-53 and NIST 800-37 risk management standards. They are now more aligned with private industry...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #Phishing
    Jaime Contreras, MBA, CISM, CISA
    Targeted Attack Uses Word Docs to Collect Info about Installed Software
    www.tripwire.com A targeted attack is abusing Word documents to collect information about different types of software installed on a user's...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Perspective | Why didn’t Equifax protect your data? Because corporations have all the power.
    www.washingtonpost.com The hack revealed how little control consumers have these...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    SEC hack is ‘bigger’ than Equifax, cybersecurity expert says
    www.foxbusiness.com As consumers struggle to wrap their heads around the Equifax breach that affected 143 million Americans, the SEC announced Wednesday its electronic filing system was breached and one cybersecurity expert says these incidents are just the tip of the...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cheat sheet: How to become a cybersecurity pro
    www.techrepublic.com If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    SEC says its corporate filing system was hacked
    www.cbsnews.com Cyberthieves may have profited from gaining access to the agency's database for public-company...
    Relevant
  21. John Enright

    John Enright

    21/09/2017
    John Enright
    Hackers hate ransomware, but it's quickly becoming the new DDoS
    www.healthcareitnews.com While nearly half of hackers are contemplating a ban on the sale of ransomware, new attack methods like those used in WannaCry and Petya demonstrate that it isn’t going anywhere...
    Relevant
  22. John Enright

    John Enright

    21/09/2017
    John Enright
    The practical guide to fighting ransomware
    betanews.com Close your eyes for a second. Imagine you are in charge of an IT security team in an enterprise, where the headcount is measured in the thousands. Or, you’re the single security engineer in a startup that just hired its 100th...
    Relevant
  23. John Enright

    John Enright

    21/09/2017
    John Enright
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Paradise ransomware is a fresh hell for computer users
    www.scmagazine.com Researchers have discovered a ransomware-as-a-service program called Paradise, which possible infects computers via hacked Remote Desktop services. RSA...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #AlamoNews, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Northrop Grumman Adds to Growing Cybersecurity Hub in San Antonio | Xconomy
    www.xconomy.com San Antonio---Northrop Grumman, the military contractor that makes everything from cybersecurity systems to fighter planes, has signed a five-year lease...
    Relevant
See all