Cyber security isn’t just an issue for governments and corporations, but an issue we all face—that’s because the favorite weapon of hackers and terrorists is your computer.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
Senator Coons hosted a Senate Law Enforcement Caucus briefing on cyber security Wednesday to highlight the crucial role state and local agencies play in the fight against cybercrime, an increasingly common security threat.
GCHQ and the Cyber Security Challenge have developed a new competition for people not working in security.
EC-Councils Rocket City TakeDownCon will not only provide the industrys best training to those who are looking to increase their cyber security savvy, but it will also provide the most affordability to those who have been hit by the sequester or other budgetary concerns. Coming to Huntsville, Alabama this July, the Rocket City TakeDownCon offers EC-Councils flagship certification, the Certified Ethical Hacker, as well as their Computer Hacking Forensic Investigator and Certified Security Analyst for $2495.
Reservists in the British Army will become specialists in cyber security, chemical-biological warfare and intelligence under sweeping reforms being carried out to transform the force in preparation for future conflicts, The Independent has learnt.
Hurry up for EARLY REGISTRATION to “BLACK HAT REGIONAL SUMMIT ISTANBUL” training and summit to be held in Halic Istanbul Congress Centre on September 10-12, 2013.
A threat advisory paper by information security firm Command Five has made the claim that Atlassian may be including a backdoor in its Crowd software.
Kim Dotcom addressed the NZ parliament’s intelligence and security committee on Wednesday, as its government considers allowing the normally foreign-focused Government Communications Security Bureau to spy on citizens.
The image on the screen (see below) shows a cyber-attack in progress, but it doesn’t look like the rows of reports that you usually expect to see as event data flows from intrusion prevention systems, next-generation firewalls and security reporting systems.
Last week I put together a post on an easy to use encrypted e-mail service known as Voltage SecureMail Cloud.