Information Security
20 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Jen Hitchcock
Scoop.it!

Hewlett-Packard Grants Scholarships To 11 Female Cyber-Security ...

Hewlett-Packard Grants Scholarships To 11 Female Cyber-Security ... | Information Security | Scoop.it
Hewlett-Packard grants scholarships to 11 women who are kicking butt in cyber-security, a field where women are underrepresented.
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Sightline for CDM Meets Strict DHS Federal Guidelines for CDM Solutions - DigitalJournal.com

Sightline for CDM Meets Strict DHS Federal Guidelines for CDM Solutions DigitalJournal.com Sightline Systems, a leading solution for server and network performance monitoring and reporting, meets the four essential functional requirements, as...
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Cyber-Security Threats Rise in Frequency, Complexity - eWeek

Cyber-Security Threats Rise in Frequency, Complexity - eWeek | Information Security | Scoop.it
eWeek
Cyber-Security Threats Rise in Frequency, Complexity
eWeek
Tom Kellerman, chief cybersecurity officer for Trend Micro, told eWeek the recent cybercrime events represent a harbinger of things to come.
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Cramer's top cybersecurity stock is ... - CNBC

Cramer's top cybersecurity stock is ... - CNBC | Information Security | Scoop.it
Cramer's top cybersecurity stock is ...
CNBC
"This is, by far, the company that is way ahead of everybody and they will tell you that in terms of cybersecurity in this country, most companies are nowhere," Cramer said.
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Big Data's Poster Child Has Issues—But They're Not Slowing Hadoop Down - ReadWrite

Big Data's Poster Child Has Issues—But They're Not Slowing Hadoop Down
ReadWrite
Pity poor Hadoop. The open-source software framework is virtually synonymous with the Big Data movement.
more...
No comment yet.
Rescooped by Jen Hitchcock from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Intelligence Must be Applied to be Useful, Official Says - Department of Defense

Intelligence Must be Applied to be Useful, Official Says - Department of Defense | Information Security | Scoop.it
Intelligence Must be Applied to be Useful, Official Says
Department of Defense
Undersecretary of Defense for Intelligence Michael G. Vickers participates in a panel on the U.S.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Jen Hitchcock from 21st Century Learning and Teaching
Scoop.it!

The Internet of Things Is the Hackers' New Playground

The Internet of Things Is the Hackers' New Playground | Information Security | Scoop.it
A new study finds new Internet connected gadgets tend to lack the most basic security.

 

What’s happening, says Mike Armistead, VP and general manager of HP’s Fortify unit, is that manufacturers are rushing to get their products on the market without doing the harder work of locking their devices down against the most basic kinds of attacks.


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

 


Via Gust MEES
more...
Gust MEES's curator insight, August 2, 2014 10:53 AM

What’s happening, says Mike Armistead, VP and general manager of HP’s Fortify unit, is that manufacturers are rushing to get their products on the market without doing the harder work of locking their devices down against the most basic kinds of attacks.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Scooped by Jen Hitchcock
Scoop.it!

HP Protect--It's time to network with your security peers

HP Protect--It's time to network with your security peers | Information Security | Scoop.it
This is the HP Protect event’s 10th year, and once again, we’ll be delivering the best in networking, sessions, and presentations to security-minded peers from around the world!
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

8/6 Webcast: Continuous Diagnostics & Mitigation for #Government ...

Guide for Continuous Monitoring of Information Systems and Organizations. Home. « For cyber-defense ... From: SANS Institute. 8/6 Webcast: Continuous Diagnostics & Mitigation for #Government Agencies: Is It Working?
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Cybersecurity should be professionalized - Computerworld

Cybersecurity should be professionalized - Computerworld | Information Security | Scoop.it
Cybersecurity should be professionalized Computerworld Computerworld - The time is ripe for industry and government stakeholders to consider professionalizing cybersecurity, according to a report from Salve Regina University's Pell Center for...
more...
No comment yet.
Rescooped by Jen Hitchcock from Digital-News on Scoop.it today
Scoop.it!

Beware Big Data's Easy Answers

Beware Big Data's Easy Answers | Information Security | Scoop.it
They're not always accurate.

Via Thomas Faltin
more...
No comment yet.
Rescooped by Jen Hitchcock from Digital-News on Scoop.it today
Scoop.it!

Top 5 Internet of Things Security Concerns

Top 5 Internet of Things Security Concerns | Information Security | Scoop.it
Security concerns are developing faster than the Internet of Things (IoT). But HP claims it is tackling IoT related concerns head on and has identified what it describes as the top five issues for businesses to consider. The research, carried out by Fortify, part of HP Enterprise Security Products, confirms those security concerns. It shows 70 percent of the most commonly used IoT devices contain vulnerabilities, including password security, encryption and general lack of granular use Topic: Internet of Things.

Via Thomas Faltin
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

16 resources to learn and understand Hadoop

16 resources to learn and understand Hadoop | Information Security | Scoop.it
Enjoy the reading and learning. Add your own suggestions in the comment section.
more...
No comment yet.
Rescooped by Jen Hitchcock from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

The lost art of #passwords: What we lost when hackers conquered the Internet

The lost art of #passwords: What we lost when hackers conquered the Internet | Information Security | Scoop.it
These days we're adopting increasingly complex passwords to protect our information. Here's what we're giving up

Via Frederic GOUTH
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

NIST is Starting Point for Cybersecurity - Wall Street Journal (blog)

NIST is Starting Point for Cybersecurity - Wall Street Journal (blog) | Information Security | Scoop.it
Wall Street Journal (blog) NIST is Starting Point for Cybersecurity Wall Street Journal (blog) The National Institute of Standards and Technology's cybersecurity guidelines for utilities, banks and other crucial industries serve as the baseline for...
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Agencies slow to move out on DHS cyber program, survey says - FederalNewsRadio.com

Agencies slow to move out on DHS cyber program, survey says - FederalNewsRadio.com | Information Security | Scoop.it
Agencies slow to move out on DHS cyber program, survey says FederalNewsRadio.com A year after the Department of Homeland Security formally launched its effort to move agencies toward a continuous diagnostic and mitigation approach to cybersecurity,...
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

When to use Hadoop (and when not to) - ITworld.com

When to use Hadoop (and when not to) - ITworld.com | Information Security | Scoop.it
When to use Hadoop (and when not to)
ITworld.com
There are a number of reasons why Hadoop is an attractive option.
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Beware of MonsterMind: Secret cybersecurity program could automate ... - Daily Digest

Beware of MonsterMind: Secret cybersecurity program could automate ... - Daily Digest | Information Security | Scoop.it
Daily Digest
Beware of MonsterMind: Secret cybersecurity program could automate ...
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

USF Center for Cybersecurity sees strong student interest - Tampa Bay Business Journal (blog)

USF Center for Cybersecurity sees strong student interest - Tampa Bay Business Journal (blog) | Information Security | Scoop.it
USF Center for Cybersecurity sees strong student interest Tampa Bay Business Journal (blog) The University of South Florida Center for Cybersecurity, a bold initiative to make the state of national leader in cybersecurity, has generated some buzz...
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

600 Retailers Ensnared in Major New Malware Attack, Cybersecurity Firm Says

600 Retailers Ensnared in Major New Malware Attack, Cybersecurity Firm Says | Information Security | Scoop.it
The Department of Homeland Security is investigating the widespread use of "Backoff" malicious software, which steals data through remote access applications (600 Retailers Ensnared in Major New Malware Attack, Cybersecurity Firm Says (TIME)
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Company Resilience and Game Technology: Scenario Planning 2.0 - Forbes

Company Resilience and Game Technology: Scenario Planning 2.0 - Forbes | Information Security | Scoop.it
Company Resilience and Game Technology: Scenario Planning 2.0
Forbes
He has lectured worldwide on his inventions, whose applications include risk measurement and mitigation, cyber resilience, and economic development.
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Separating Cybersecurity Hype from Reality - Town Hall

Separating Cybersecurity Hype from Reality - Town Hall | Information Security | Scoop.it
Town Hall
Separating Cybersecurity Hype from Reality
Town Hall
LAS VEGAS -- The big players in the global information-security industry are intermingling with computer hackers this week at the annual Black Hat conference in Las Vegas.
more...
No comment yet.
Rescooped by Jen Hitchcock from Digital-News on Scoop.it today
Scoop.it!

The Scary State of Cybersecurity and Critical Infrastructure

The Scary State of Cybersecurity and Critical Infrastructure | Information Security | Scoop.it
A Ponemon study found that security programs are not fully deployed and more than half are vulnerable to threats that impact critical infrastructure.

Via Thomas Faltin
more...
No comment yet.
Scooped by Jen Hitchcock
Scoop.it!

Threat intelligence lifecycle maturation in the enterprise market

Threat intelligence lifecycle maturation in the enterprise market | Information Security | Scoop.it
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.
more...
No comment yet.
Rescooped by Jen Hitchcock from Surfing the Broadband Bit Stream
Scoop.it!

Internet of things devices contain high number of vulnerabilities, study finds | Lucian Constantin | NetworkWorld.com

Internet of things devices contain high number of vulnerabilities, study finds | Lucian Constantin | NetworkWorld.com | Information Security | Scoop.it

A security audit of 10 popular Internet-connected devices—components of the so-called “Internet of things”—identified an alarmingly high number of vulnerabilities.

 

The study lasted three weeks and was performed by researchers from Hewlett-Packard’s Fortify division. It targeted devices from some of the most common IoT categories: TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and garage door openers.

 

All of the analyzed devices, which weren’t named in the resulting report published Tuesday, communicated with some type of cloud service, as well as mobile applications that allowed users to remotely control them.

 

The HP researchers identified a total of 250 vulnerabilities ranging from issues that could raise privacy concerns to serious problems like lack of transport encryption, vulnerabilities in the administration Web interface, insecure firmware update mechanisms and weak or poorly protected access credentials.

 

Click headline to read more--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc
more...
No comment yet.