Search

Protecting Yourself from Fraud During the U.S. Government Shutdown

PROTECTING YOURSELF FROM FRAUD DURING THE U.S. GOVERNMENT SHUTDOWN

The U.S. government shutdown that started on December 22, 2018, is now the longest on record and is impacting more than 800,000 federal...

 
 
 
With Room To Grow, Facebook Boston Moves Into Shiny, New Office

WITH ROOM TO GROW, FACEBOOK BOSTON MOVES INTO SHINY, NEW OFFICE

View the Slideshow Facebook's new Boston office-which is really in Cambridge, MA-is up and running, and there's plenty of elbow room....

Identity as Security Key: Akamai Buys Online Access Firm Janrain

IDENTITY AS SECURITY KEY: AKAMAI BUYS ONLINE ACCESS FIRM JANRAIN

It's an online security concern perhaps best distilled in a popular 1993 comic from The New Yorker magazine. “On the Internet, nobody...

 
 
 
Executive Profile: Cybersecurity expert shares stories of U.S. vice presidents

EXECUTIVE PROFILE: CYBERSECURITY EXPERT SHARES STORIES OF U.S. VICE PRESIDENTS

Plying the cybersecurity trade brought Charles Denyer into contact with former U.S. vice presidents. In developing friendships with...

Tax Fraud: Scammers Ramp Up Their Tactics in 2019

TAX FRAUD: SCAMMERS RAMP UP THEIR TACTICS IN 2019

2019 Tax Fraud | Keep Your Personal Information Safe As the IRS cracks down on tax refund fraud, scammers will be innovating new ways...

 
 
 

SENIOR COMPUTER SECURITY SYSTEMS SPECIALIST-LEAD SCOTT AFB

The Cybersecurity Analyst is a member of the Defensive Cyber Operations team. This team supports network assurance activities within...

 
 
 
U.S. cybersecurity experts scrambling to thwart major attacks on power, water, gas infrastructure by “bolting on” fixes to old vulnerable systems

U.S. CYBERSECURITY EXPERTS SCRAMBLING TO THWART MAJOR ATTACKS ON POWER, WATER, GAS INFRASTRUCTURE BY “BOLTING ON” FIXES TO OLD VULNERABLE SYSTEMS

Crammed into a small building in Idaho Falls, Idaho, a group of about 50 cyber security experts and researchers are working around...

 
 
 
How to protect your cell phone number and why you should care

HOW TO PROTECT YOUR CELL PHONE NUMBER AND WHY YOU SHOULD CARE

Getty Images Assuming you have your strong passwords in place and your two-factor authentication set up, you think your accounts are...

Two-factor authentication can save you from hackers

TWO-FACTOR AUTHENTICATION CAN SAVE YOU FROM HACKERS

Getty Images If you find passwords annoying, you might not like two-factor authentication much. But security experts say it's one of...

 
 
 
Huawei to spend $2B over five years to beef up cybersecurity

HUAWEI TO SPEND $2B OVER FIVE YEARS TO BEEF UP CYBERSECURITY

Huawei Technologies on Tuesday said it would spend $2 billion over the next five years to focus on cybersecurity by adding more people...

 
 
 
Truepic Acquires Image Forensics IP to Broaden Anti-Fraud Offering

TRUEPIC ACQUIRES IMAGE FORENSICS IP TO BROADEN ANTI-FRAUD OFFERING

Image authentication startup Truepic said Tuesday it has acquired the intellectual property and software behind San Jose-based Fourandsix...

 
 
 

SR TECHNICAL EXPERT CYBERSECURITY - WALMART LABS - WALMART - BENTONVILLE, AR

 
 
 
Rudy Giuliani, a Trump cybersecurity adviser, doesn't understand the internet

RUDY GIULIANI, A TRUMP CYBERSECURITY ADVISER, DOESN'T UNDERSTAND THE INTERNET

Welcome back to the latest edition of politicians don't get technology! Our latest guest is Rudy Giuliani, former New York mayor and...

What does good data security look like in 2019?

WHAT DOES GOOD DATA SECURITY LOOK LIKE IN 2019?

What does good data security look like in 2019? In recent years, cybersecurity has increasingly been placed at the front of public...