;
  1. Home
  2. Events

Tag: Events

How to manage IoT cybersecurity

How to manage IoT cybersecurity

On top of that, quite a few IoT devices are the result of the convergence of cloud computing, mobile computing, embedded systems, big data, low-price hardware, and other technological advances. IoT devices can provide computing…

Read More
Feds Issue Warning About Mass-Shooting-Related Scams, Malware

Feds Issue Warning About Mass-Shooting-Related Scams, Malware

A federal security agency is warning people to be wary of criminals using the recent mass-shootings in El Paso, Tex. and Dayton, Ohio as an opportunity to launch malware attacks and scams. The Cybersecurity and…

Read More

Senate report: Fla. officials failed to act on Russian hacking warnings

Senate report: Fla. officials failed to act on Russian hacking warnings Click here to view original web page at www.keyt.com WASHINGTON (CNN) – Florida officials struggled to manage their cybersecurity and failed to heed multiple…

Read More
States need cyber disruption response plans, NGA says

States need cyber disruption response plans, NGA says

More state governments need to start assembling plans for how they would deal with a widespread cyberattack, according to a new paper from the National Governors Association. Adopting a cyber disruption response plan, the organization…

Read More
FutureCon Cybersecurity Conference Takes Off From Space City

FutureCon Cybersecurity Conference Takes Off From Space City

Cybercrime Magazine covered the first FutureCon cybersecurity conference in Atlanta earlier this year, and it was one of the best regional events we’ve witnessed. The most recent FutureCon conference was held this past week at the DoubleTree…

Read More

The Value of Predictive Email Security

The Value of Predictive Email Security Click here to view original web page at www.infosecurity-magazine.com Predictive technology is the use of machine learning to calculate with confidence a future event, thereby empowering organizations to proactively…

Read More
Cyber-Con Center –

Cyber-Con Center –

Cybersecurity Virtual Conference Center A center dedicated to cybersecurity virtual and hybrid events and expos. Introducing Cyber-Con Hybrid your upcoming event. Remote Attendance offers to extend your reach and a cost-effective way to laser target…

Read More
Cybercriminals are becoming more methodical and adaptive

Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according…

Read More
Venafi: Five Ways Organizations Use Machine Identities

Venafi: Five Ways Organizations Use Machine Identities

On May 2, World Password Day reminds consumers to layer up their logins by enabling multifactor authentication on their devices and online accounts. Held annually on the first Thursday of May, World Password Day is a collaborative…

Read More
Small business cybersecurity: The case for MSSPs

Small business cybersecurity: The case for MSSPs

Smaller-sized businesses, particularly those lacking an IT staff, are targets for digital bad guys. The tech media is debating which is best for small businesses: An automated-security solution or a managed-security solution. Ben Canner, a veteran…

Read More