logoSign upLog in
Cybersecurity - beBee


~ 100 buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  1. Jaime Contreras

    Jaime Contreras

    Jaime Contreras
    Cyber security trends for 2017
    www.interaksyon.com Cyber security provider Sophos looks into his crystal ball to predict the top cyber security trends for...
  2. Jaime Contreras

    Jaime Contreras

    Jaime Contreras
    Criminals phish credit card numbers with 'Twitter verification' scam
    www.scmagazine.com Criminals are targeting users on Twitter purporting to offer verified account status but instead taking over their accounts, according to...
  3. ProducerDavid B. Grinberg
    Cybersecurity is Top Business Priority in 2017
    Cybersecurity is Top Business Priority in 2017How concerned are you about falling prey to cyberattacks in the New Year? Whether you’re a corporate CEO or a small business owner, strengthening cybersecurity should be a top business priority in 2017. In fact, it should be a “no brainer”...


    David B. Grinberg
    06/01/2017 #32 David B. Grinberg
    FYI NEWS UPDATE: According to Politico.com and a statement from President-elect Trump...what do YOU think?

    Politico: "[Trump] said he will appoint a team upon assuming the presidency responsible for creating a plan within the first 90 days of his administration to combat cyberattacks."

    Trump Statement: "Whether it is our government, organizations, associations or businesses we need to aggressively combat and stop cyberattacks.The methods, tools and tactics we use to keep America safe should not be a public discussion that will benefit those who seek to do us harm. Two weeks from today I will take the oath of office and America's safety and security will be my number one priority."

    Read more: http://www.politico.com/story/2017/01/trump-statement-233297
    Shree Laxmi Art
    05/01/2017 #31 Shree Laxmi Art
    science beyond science #rethink.......
    David B. Grinberg
    05/01/2017 #30 David B. Grinberg
    FYI - Additional reading for cyber geeks: "A Visual Map of Emerging Cybersecurity Trends" via TechRepublic.com
    David B. Grinberg
    05/01/2017 #29 David B. Grinberg
    Many thanks for your incredibly valuable feedback, Zacharias, which is most appreciated. You make several excellent points for which we should all pay attention. I'd be interested in your take of an article from today's NextGov.com on the issue per a report by the non-partisan Commission on Enhancing National Cybersecurity (except below):
    "Advancing our nation’s cybersecurity posture must be a key priority for the Trump administration, especially if we are to maximize the benefits of digital transformation...while there are many potential benefits of a more active role for the federal government in the global standards arena, this activity should be closely tied to the promotion of international, industry-driven standards. Using market-based approaches allows technology companies to focus resources on enhancing innovative security solutions for the global market, rather than on compliance with distinct requirements in different countries."
    Zacharias Voulgaris 🐝
    04/01/2017 #28 Zacharias Voulgaris 🐝
    It seems to me that the issue with cybersecurity is a bit more complex than that. In a nutshell, we have all these issues because we simply don't care enough to seek more secure solutions. The technology is there is ensure a practically perfect encryption end-to-end in all our communications, yet people still prefer to use A or B because they are either popular or they're used to using them, even if there is an option C out there that is 1. secure, 2. free to use, and 3. as easy to use as options A and B. So, please, don't make this non-issue into an issue. If we really wanted to have secure communications, for example, we wouldn't hesitate to boycott options A and B until they comply with the security standards laid down by the scientists and engineers who have spent countless hours developing them. The science and the technology is there, so we really don't have an excuse.

    Nevertheless, this was an enjoyable article to read, since it's easy to lose touch with the social and political aspects of the matter and the issue it becomes when technically inept individuals are asked to deal with it. Let's hope at least that the people these individuals hire to sort this out are more adept at understanding and dealing with the challenges at hand.
    Susan Rooks
    04/01/2017 #25 Susan Rooks
    Real threats and real concerns here . . .
    Roland Waddilove
    04/01/2017 #21 Roland Waddilove
    It affects everyone, not just businesses. Security is a major pain.
    David B. Grinberg
    04/01/2017 #20 David B. Grinberg
    #19 Thanks very much for reading, commenting and sharing this post, @Ali Anani. I echo your concerns. My informal understanding is that intelligence communities of various countries are indeed trying to recruit cyber criminals to work for those governments. However, strategic intentions will vary between democracies and authoritarian regimes. Let's hope the good guys can win over the bad guys and make cyberspace a safer place.
    Ali Anani
    04/01/2017 #19 Ali Anani
    This buzz is both alarming and cautionary @David B. Grinberg. I wonder if cybercriminals would ever consider using their talent for good causes.
    David B. Grinberg
    04/01/2017 #17 David B. Grinberg
    Many thanks to everybody below for taking the time out of your busy schedules to read, comment, share and otherwise engage with this blog post. Your gracious support and constructive comments are very much appreciated! @Sarah Elkins View more
    Many thanks to everybody below for taking the time out of your busy schedules to read, comment, share and otherwise engage with this blog post. Your gracious support and constructive comments are very much appreciated! @Sarah Elkins @Jason Versey @Franci🐝Eugenia Hoffman @Prakashan B.V Close
    Sarah Elkins
    03/01/2017 #16 Sarah Elkins
    I know I'm not the only one to be somewhat oblivious to these issues. Thanks, @David B. Grinberg, for this important reminder. We can take small steps to help ourselves, like changing passwords periodically, using different passwords, and making difficult passwords using a variety of symbols, numbers, and case.
    Jason Versey
    03/01/2017 #15 Jason Versey
    Scary good article @David B. Grinberg! Last year i flew from Chicago to Houston and sat next to a cyber security specialist. The things he shared with me blew my mind. Be afraid...be very afraid.
    Franci🐝Eugenia Hoffman
    03/01/2017 #14 Franci🐝Eugenia Hoffman
    Extremely concerning, @David B. Grinberg. The cyber thieves are always one step ahead of us. The Yahoo email cyber attack, recently reported, happened in 2014! It can happen to anyone and any time. Not a warm and cozy feeling.
    Prakashan B.V
    03/01/2017 #13 Prakashan B.V
    @David B. Grinberg...well written and informative...security is a bit scary issue though..:)
    Lyon Brave
    03/01/2017 #12 Lyon Brave
    Turbo Tax had so many security breaches because of their customer service. Their customer service needs to be like apple. 25% of Americans faced tax fraud last year. It was crazy
    Larry Boyer
    03/01/2017 #10 Larry Boyer
    Excellent topic that certainly needs more attention, especially beyond the political hacking we hear so much about. The Sony incident is a great example of corporate espionage, blackmail and brand management. While many in the DC area know to never put in writing something you don't want on the front page of the Washington Post tomorrow, that philosophy doesn't carry as much outside the beltway. Be careful of what you say and do.
    Susan Rooks
    03/01/2017 #9 Susan Rooks
    Wake up and smell the coffee, friends! @David B. Grinberg reminds us that the old "science fiction" stuff is real and it's happening now.
    Susan Rooks
    03/01/2017 #8 Susan Rooks
    This always sounds like the stuff in futuristic movies and books, @David B. Grinberg, and it's doubly scary to realize that the future is NOW!

    I think for those of us who are the little guys/gals, we need to remember that nothing is sacred in terms of the Internet. The old advice of not writing/saying/posting anything you wouldn't want to see on the front page of the NY TImes still holds.

    I am on a nonprofit board, and although we meet every month, occasionally we discuss stuff via email. Makes me crazy because sometimes it's about a person. I never add to those messages with anything other than the most general terms. I would much rather we have conference calls, but they are hard to schedule.

    Scary times, David! And no easy answers. Timely post, and thanks!
    Harvey Lloyd
    03/01/2017 #7 Harvey Lloyd
    Cyber security is a difficult task. Even with the most sophisticated systems the downstream is not initiated regardless of how much training. Upstream, those who host websites and other outside services are another risk. Our IP address got hacked and used and became part of a federal investigation, it was hacked at our service provider.

    As our dependency grows on tech so will the sophistication of those who would hack. Hacking is similar to selling bootleg movies. On the surface it seems victimless, but in reality becomes a stepping stone that builds across networks.

    The dependency will be vetted in just a few years. Today cyber crime is treated, within the masses, as a mere nuisance. What happens when a persons brand is destroyed and that is their livelihood. How will the CJS see this? I know we always link cyber security to national security to expand the seriousness of the matter. But what happens when middle class Joe gets slammed by the thousands with brand deformation.

    We need to take the threat seriously. Great discussion.
  4. Fernando 🐝 Santa Isabel Llanos
    Fernando 🐝 Santa Isabel Llanos
    Cyberattacks Strike Saudi Arabia, Harming Aviation Agency - NYTimes.com
  5. George Touryliov
    2017 is nearly upon us, so here are ITProPortal #cyber #security #predictions for the upcoming year.
    George Touryliov
    2017 cyber security for businesses predictions
    www.itproportal.com 2017 is nearly upon us, so here are our cyber security predictions for the upcoming...
  6. George Touryliov
    What is the current state of your organisation’s cyber security? Could it be time to conduct a thorough check on the health of your cyber defences, on your contingency plans in the face of cyber attacks and your overall cyber risk?
    George Touryliov
    Cyber fit and healthy: Are you ready for 2017?
    www.itproportal.com Have you cyber 'health-checked' your organisation? Why should you do this? How do you do...
  7. George Touryliov
    The following are some of the highlights of the new law -
    George Touryliov
    6 highlights of China’s new cyber security law
    www.itproportal.com The long-awaited Cyber security Law of China was finally passed at the National People’s Congress of China on November...
  8. George Touryliov
    This deal is said to create the largest consumer security business in the world with more than $2.3 billion in revenue a year according to the last fiscal year earnings of Symantec and LifeLock.
    George Touryliov
    Symantec To Buy LifeLock for $2.3 Billion
    socialbarrel.com Symantec is known as one of the largest online security companies in the world. Recently, the company is reported to buy LifeLock Inc, which is an identity theft protection...
  9. ProducerCarol Evenson

    Carol Evenson

    Protecting Big Data for Your Company
    Protecting Big Data for Your CompanyWith the growing demand for big data comes the growing demand to secure it. Network solutions such as firewalls or employee security awareness are still valid, but traditional database solutions such as permission levels or encryption are much less...
  10. Gonzalo Meza

    Gonzalo Meza

    By its very nature, computer code is astonishingly hard to audit and proof against backdoors, unwanted functionality and malicious acts by your own engineers.
    Gonzalo Meza
    How I sent my boss to jail
    ubm.io What's in the code? Does the boss have any...
  11. Gonzalo Meza

    Gonzalo Meza

    Nuclear C&C shaped the way the internet works in ways most experts know nothing about...
    Gonzalo Meza
    The Secret Nuclear History of Cat Videos
    motherboard.vice.com Behind every Rickroll is a technology designed at the height of the Cold War to guarantee nuclear...


    Joanna Hofman
    11/07/2016 #1 Joanna Hofman
    Interesting article, Gonzalo Meza. I learnt few new things. Thank you.
  12. Nicole Chardenet
    ...And, it's extremely hard to detect. Oh yay. Thank you, chip manufacturers. NOT.
    Nicole Chardenet
    This ‘Demonically Clever’ Backdoor Hides In a Tiny Slice of a Computer Chip
    www.wired.com Researchers have built a proof-of-concept processor that uses secretly stored electrical charge to trigger an ultra-stealthy...


    Gonzalo Meza
    06/06/2016 #2 Gonzalo Meza
    Are your computers / smartphones / devices compromised? Probably.
    eric nixon
    05/06/2016 #1 eric nixon
    Probably why US DoD makes chips for mission sensitive programs domestically. I believe DARPA considered this more than 10 yrs ago when PRCA attempted to bring corrupted chips in the country in electronic pic frames
  13. ProducerPhil Friedman

    Phil Friedman

    Not All Clouds Have a Silver Lining
    Not All Clouds Have a Silver LiningCLOUD-BASED SYSTEMS ARE ATTRACTIVE FOR SMALL BUSINESSES, BUT THEY CAN BE THE WRONG CHOICE...I am not an IT person. I am, however, an experienced small-businessman and consultant, with considerable experience in purchasing, implementing, and using...


    Phil Friedman
    26/05/2016 #13 Phil Friedman
    #12 @ @Franci🐝Eugenia Hoffman - That is true. But even if we ignore the risk involved in having some other than yourself hold important and sensitive data on your behalf, we need to understand that cloud-based computing will continue to fail at times when a robust internet connection is not available -- for example, most of the time while flying on a commercial airliner. To my mind, the situation with cloud-based computing is the usual one of marketing people running way out ahead of real-world fulfillment. Thank you for reading and commenting. Cheers!
    Franci🐝Eugenia Hoffman
    26/05/2016 #12 Franci🐝Eugenia Hoffman
    My thoughts on Cloud-based computing is I don't like putting all of my eggs in one basket, especially if I am renting the basket.
    Phil Friedman
    25/05/2016 #11 Phil Friedman
    #6 @ @Paul "Pablo" Croubalian - I sympathize with what you're saying -- as someone whose mission is to be critical :-) Thank you for reading and commenting. Cheers!
    Phil Friedman
    25/05/2016 #10 Phil Friedman
    #7 @ @Pamela 🐝 Williams - Yes, those of us who travel a lot know well the travails (travailia?) of cloud computing. If I were to rely entirely on cloud-based computing, every time I fly to Taiwan, I would lose more than a day's potential working time while in-flight. And BTW,don't believe for a minute that the airlines actually provide in-flight internet service. In my experience, fewer than 50% of planes have been fitted with the equipment, and of those which have, fewer that 20% of those are actually functional -- never mind the exorbitant fees for using it. Thank you for reading and commenting. Cheers!
    Phil Friedman
    25/05/2016 #9 Phil Friedman
    #4 @ John Williams - I have no doubt that some people will find cloud-based computing satisfactory from an operational standpoint. But I doubt they are in areas of the world without reliable and robust internet services. And I doubt that such persons travel much. Security is another matter entirely, but of equal concern. Thank you for reading and commenting.
    Phil Friedman
    25/05/2016 #8 Phil Friedman
    #5 @Donna-Luisa Eversley - This is not a technical issue. It is simply the case that that universal, reliable, and robust WiFi and internet service does not yet exist. So if you base all your programs and data in "The Cloud", there will be times that you will be unable to work or access those programs and data files. My recommended approach for most small-business is to 1) work only with software that keeps a functioning copy on your local drive, 2) keep your critical current working files on a local drive or auxiliary drive, and 3) keep a mirror of your data files in the Cloud (which mirror is synced at regular intervals with your local files). Thank you for reading and commenting.
    Pamela 🐝 Williams
    25/05/2016 #7 Pamela 🐝 Williams
    Makes 100% sense @Phil Friedman, and there is also the caveat of public access. At one company I worked for it disallowed accessing the internet on company owned laptops if the source was public. That immediately ruled out airports, Starbucks, or any other public WiFi. I tried to do some urgent 'updates' from a hotel while on vacation and ended up having to call and walk a teammate through the fixes because the laptop wouldn't allow me to access the company system or the cloud. Secure; yes. Conducive to working on the road, No.
    Paul "Pablo" Croubalian
    25/05/2016 #6 Paul "Pablo" Croubalian
    I have a phobia against building on rented land. I do use the cloud for many things, but none of them are "mission-critical." (Sorry, for the use of an over-used phrase).
    Donna-Luisa Eversley
    25/05/2016 #5 Donna-Luisa Eversley
    @Phil Friedman great obsevations.The biggest challenge for entrepreneurs with cloud computing storage is access and integration when you need it ...as internet access is never always foolproof. As secondary storage i think its great. For small businesses and entrepreneurs it may be best to really evaluate backup options, because it can be an embarrassing situation. I can recall years ago launching an interactive website and visiting customers trying to illustrate how easy access was on tablet, mobile, and computer... well , that day there was a problem with access in the area...something happened to a cell tower and we could not get online. To make the time valuable, i thought to review offline some information with client and had no access to get in...

    @Shubhanshu Garg...can you share your expertise in this area with us please :-)
    John Williams
    25/05/2016 #4 John Williams
    Interesting, I used to find cloud computing just fine until I read this. Cybersecurity is also another topic to take into consideration.
    Phil Friedman
    25/05/2016 #3 Phil Friedman
    Thank you, Pascal, for reading and sharing this post. Cheers!
    Phil Friedman
    25/05/2016 #2 Phil Friedman
    Thank you, Catalina, for sharing this post
    Phil Friedman
    25/05/2016 #1 Phil Friedman
    Thanks, @Matt 🐝 Sweetwood for sharing this post. Cheers!