With Jeep and Burger King becoming the recent victims of a hacker attack, cybersecurity has become the focus point for many enterprises and CIOs. What should CIOs do to counter the spread of cyber attacks? Can anything be done at all?
Answer Question | March 18, 2013 2:22 PM
During this year’s RSA Conference, security experts Ed Skoudis and Johannes Ullrich detailed how everything from an industrial control system to big financial institutions are vulnerable to a widespread cyber kinetic attack. Skoudis also expressed concerns that society continues to ignore the risks of these types of attacks. Do you think we’re prepared for a [...]
Answer Question | March 18, 2013 2:18 PM
President Obama issued his long awaited Cybersecurity executive order which is aimed at improving public-private information sharing. However, many skeptics believe this order won’t get anything done. Do you think Obama’s executive order will go through? What impact will it have on the Cybersecurity industry?
Answer Question | February 26, 2013 7:46 PM
According to a recent TechTarget survey, compliance, viruses and mobile were among the top security priorities for respondents and their companies in 2013. What security trend worries you the most in 2013? Will companies see an increase in cyber attacks this year?
Answer Question | February 26, 2013 8:53 PM
A lack of people with the appropriate skills is widely acknowledged on both sides of the Atlantic as being a major challenge to bringing national cyber defense capabilities up to standard. What skills would be most valuable for the force look for in potential hires?
Answer Question | February 19, 2013 9:10 PM
According to Symantec, cyber crime will become the ‘norm’ in 2013 as more nations and groups will use cyber tactics to destroy sensitive funds and information. The company anti-virus company believes the top threat will come from hacktivist groups, who will specialize in attacks on individuals and non-government organizations. Tell us how you will protect [...]
Answer Question | November 20, 2012 7:48 PM
cybersecurity, Hackers, Security
What are some indicators that your PC (XP) has been/is being hacked. EX: I was surfing (MozFire) and the browser seemed to freeze momentarily. I closed and reopened, but when I ended my session I noticed my PC clock had frozen for an hour, I started session at 11:10. I ended at 1:05 but the [...]
Answer Question | September 17, 2012 11:03 PM
From online banking to email accounts, passwords have become a very important part of our everyday lives. This week, we posted an infographic that shows how passwords are at greater risk than ever before. How are you protecting yourself from a password attack?
Answer Question | September 10, 2012 5:39 PM
cybersecurity, Password management
Should encryption be explicitly proscribed in Data Security and Privacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think? Troy Tate, thanks, are you recommending the law should explicitly require 1024-bit minimum key length? I’m [...]
Answer Question | November 9, 2012 12:23 PM
cybersecurity, Encryption, privacy, Security
Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?
Answer Question | November 30, 2011 1:28 AM
cybersecurity, Encryption, Massachusetts Data Privacy Law, privacy, Security, White House Cybersecurity Initiative
I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?
Answer Question | September 14, 2012 5:45 PM
cybersecurity, Hackers, Hacking, malware, Security, Viruses