Advanced Computing in the Age of AI | Thursday, March 28, 2024

Slam the Door Against Insider Threats

When a banker falls behind on the mortgage, a physician gets arrested for driving under the influence, or a contractor is working on a sensitive federal construction site under ...Full Article

Old Passwords, Anonymity Software Suspected in Baseball Hack

The database hacking scandal rocking Major League Baseball raises new questions about how to secure insider information about the algorithms developed by professional sports teams to evaluate prospects and ...Full Article

To Improve Cybersecurity, Fire Some CEOs

Despite the amazing number of cybersecurity breaches, so far the Target CEO appears to have been the only one to pay the price. While we hear some calls for ...Full Article

RAND Corp: Manage Security Like a Business

Organizations must figure out a better way to manage cybersecurity like a business, using metrics to determine the relative return on investment (RROI), and constantly evaluating the lifecycle and ...Full Article

Study: NSA Spying Fallout Extends Beyond Cloud

U.S. National Security Agency digital surveillance programs that were previously estimated to cost U.S. cloud vendors as much as $35 billion in sales by 2016 could "far exceed" that ...Full Article

How to Avoid Being a Hacker Victim

Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article

Federal State of Cyber Insecurity: New Day, New Breach?

When the United States government accused China of hacking the Office of Personnel Management and gaining access to the records of 4 million current and former federal employees, it ...Full Article

Average Data Breach Costs $3.8 Million, Ponemon Finds

When an organization's records are breached, it costs an average of $3.8 million to overcome the attack, according to the newly released Ponemon Institute's "Cost of Data Breach Study: ...Full Article

Booming Security Market Reflects Shift to Cloud

Seemingly nonstop reports of network security breaches—the latest one at the Internal Revenue Service—and heightened awareness about the need to button down corporate infrastructure appears to be reflected in ...Full Article

Social Engineering Targets Weakest Security Link: Employees

Without ongoing employee training, an enterprise's expensive security infrastructure investment means little. But very few corporations protect themselves from the growing threat of social engineering. Today only 7 percent ...Full Article
Page 5 of 6« First...23456
EnterpriseAI