SOFTSHELL AG

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Blockchain & The Battle To Secure Digital Identities

    Blockchain & The Battle To Secure Digital Identities This emerging technology is a promising way to verify transactions without compromising your digital identity. More @Facebook: Blockchain & The Battle To Secure Digital Identities

  • Millennials see future in cyber security – Enterprise Times

    Millennials see future in cyber security – Enterprise Times Raytheon reports that Millennials are beginning to see a career in cyber security but is the training and mentoring they need available? More @Facebook: Millennials see future in cyber security – Enterprise Times

  • 4 Reasons to Get Your Master’s Degree in Cyber Security

    4 Reasons to Get Your Master’s Degree in Cyber Security There is a talent shortage in the cyber security field. But you need the right amount of education to enter the industry–usually a master’s degree. More @Facebook: 4 Reasons to Get Your Master’s Degree in Cyber Security

  • 7 Regional Hotbeds For Cybersecurity Innovation

    7 Regional Hotbeds For Cybersecurity Innovation These regions are driving cybersecurity innovation across the US with an abundance of tech talent, educational institutions, accelerators, incubators, and startup activity. More @Facebook: 7 Regional Hotbeds For Cybersecurity Innovation

  • Why are Skype accounts getting hacked so easily?

    Why are Skype accounts getting hacked so easily? If you’ve received a weird message on Skype with a link to Baidu or LinkedIn recently, you’re not alone. In the past couple of weeks, I’ve received spam links to Baidu from six of my Skype… More @Facebook: Why are Skype accounts getting hacked so easily?

  • New Tools Aim to Close the Cybersecurity Skills Gap

    New Tools Aim to Close the Cybersecurity Skills Gap Two NIST initiatives aim to close the cybersecurity skills gap. One is an interactive, online tool known CyberSeek; the other is updated guidance known as the NICE More @Facebook: New Tools Aim to Close the Cybersecurity Skills Gap

  • 7 Security Lessons The Video Game Industry Can Teach IoT Manufacturers

    7 Security Lessons The Video Game Industry Can Teach IoT Manufacturers The Internet of Things has alarming holes in security. The industry should look to video games for some answers. More @Facebook: 7 Security Lessons The Video Game Industry Can Teach IoT Manufacturers

  • Mom Plays 12 Hilarious Characters to Promote Online Safety for Families

    Mom Plays 12 Hilarious Characters to Promote Online Safety for Families See how one mom – playing 12 hilarious characters – keeps her family safe online by following simple tips from Sophos. Visit http://www.sophos.com/toolkit fo… More @Facebook: Mom Plays 12 Hilarious Characters to Promote Online Safety for Families

  • Horrible hacks, death robots, and kamikaze phones: Meet the scariest tech of the year | ZDNet

    Horrible hacks, death robots, and kamikaze phones: Meet the scariest tech of the year | ZDNet These might be the stuff of nightmares. More @Facebook: Horrible hacks, death robots, and kamikaze phones: Meet the scariest tech of the year | ZDNet

  • 20 Endpoint Security Questions You Never Thought to Ask

    20 Endpoint Security Questions You Never Thought to Ask The endpoint detection and response market is exploding! Here’s how to make sense of the options, dig deeper, and separate vendor fact from fiction. More @Facebook: 20 Endpoint Security Questions You Never Thought to Ask

SOFTSHELL AG

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • Identity and personal data theft account for 64% of all data breaches – Help Net Security

    Identity and personal data theft account for 64% of all data breaches – Help Net Security The Breach Level Index is a global database that tracks data breaches and measures their severity based on multiple dimensions. More @Facebook: Identity and personal data theft account for 64% of all data breaches – Help Net Security

  • Monday review – the hot 24 stories of the week

    Monday review – the hot 24 stories of the week From the Siri-opened “smart” locked front door to the 300K payment card and 500M Yahoo account data breaches, catch up with the latest news! More @Facebook: Monday review – the hot 24 stories of the week

  • The 10 Biggest Data Breaches of Summer 2016

    The 10 Biggest Data Breaches of Summer 2016 The summer of 2016 saw a significant number of data breaches. However, these ten incidents had the worst consequences for companies and their customers. More @Facebook: The 10 Biggest Data Breaches of Summer 2016

  • Bahamas files leaks expose politicians' offshore links

    Bahamas files leaks expose politicians' offshore links Leak of 1.3m files reveals offshore business dealings of home secretary Amber Rudd and former EU commissioner Neelie Kroes More @Facebook: Bahamas files leaks expose politicians' offshore links

SOFTSHELL AG

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • 10 key considerations when building a private cloud

    10 key considerations when building a private cloud Private cloud can be a transformative, but it requires significant thought, dedication and perseverance More @Facebook: 10 key considerations when building a private cloud

  • Monday review – the hot 19 stories of the week

    Monday review – the hot 19 stories of the week From the teen suing her parents over childhood photos on Facebook to how Google Play tracks you even without authorisation and much more! More @Facebook: Monday review – the hot 19 stories of the week

  • 9 biases killing your security program

    9 biases killing your security program Here’s a (by no means all-inclusive) list of nine such cognitive biases that security professionals should especially remain aware. More @Facebook: 9 biases killing your security program

  • Insider Incidents Cost Companies $4.3 Million Per Year On Average

    Insider Incidents Cost Companies $4.3 Million Per Year On Average Breaches caused by external attackers posing as insiders are the most financially damaging, Ponemon Institute survey finds. More @Facebook: Insider Incidents Cost Companies $4.3 Million Per Year On Average

SOFTSHELL AG

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • New tech can help catch spearphishing attacks

    New tech can help catch spearphishing attacks Highly-targeted spearphishing attacks slip past spam and anti-virus filters, but new approaches that look for more subtle patterns can help reduce the threat More @Facebook: New tech can help catch spearphishing attacks

  • Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information – Dark Reading

    Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information – Dark Reading Interoperability and automation are keys to defining success in computer network defense. More @Facebook: Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information – Dark Reading

  • Monday review – the hot 18 stories of the week

    Monday review – the hot 18 stories of the week From the politician’s accidentally tweeted password and the Playmate’s body-shaming victim to the porn site password dump, and much more! More @Facebook: Monday review – the hot 18 stories of the week

  • Global Smartphone Malware Jumps 98% Over Six Months

    Global Smartphone Malware Jumps 98% Over Six Months Global Smartphone Malware Jumps 98% Over Six Months. Android in the dock again, according to Nokia report More @Facebook: Global Smartphone Malware Jumps 98% Over Six Months

  • 6 Common Phishing Attacks and How to Protect Against Them

    6 Common Phishing Attacks and How to Protect Against Them I will discuss six common phishing attacks and provide some useful tips on how organizations can protect themselves against those scams. More @Facebook: 6 Common Phishing Attacks and How to Protect Against Them

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in