All posts by Jeff Hyatt

Featured Jobs: Cisco; Apple; DXC Technology

Software Engineer, Network Threat Defense — Austin, TX — Cisco Security Architect, Platform Architecture — Santa Clara Valley, CA — Apple Information System Security Office... More

IBC 2017: VR, Cloud, Security are Key Issues at 50th IBC (Light Reading)

IBC will celebrate its 50th anniversary starting this Thursday, September 14. As with previous years, the entire European media industry will converge on Amsterdam to discuss the f... More

How the WannaCry Attack Will Impact Cyber Security (Knowledge @ Wharton)

The worldwide cyber attack that began last Friday and goes by the name of “WannaCry” has highlighted the need for governments and businesses to strengthen their security infras... More

X-Files and Videotape: The Early Days of Internet Piracy (CNET)

Today, content flows so freely and easily within moments of broadcast at the speed of light, delivered in torrential clusters that separate what you get from any real person who ha... More

The FTC Announces Operation Tech Trap to Help Thwart Scam ‘Tech Support’ Popups (VentureBeat)

If you’ve ever had your web browser taken over by a hard-to-close window declaring that your computer is infected with viruses, the Federal Trade Commission (FTC) is finally here... More

Cybersecurity Consciousness in the C-Suite (SC Media)

With cybercriminal risk at an all-time high across the globe, it's only inevitable that your company will be targeted, experts say. But, they add, the manner in which a company pre... More

8 Ways to Manage an Internet or Security Crisis (CSO)

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are ju... More

Russian Spies Conspired with Most Wanted Cybercriminal in Yahoo Hack — DOJ (Forbes)

Prosecutors today unsealed an indictment charging four men, including two Russian intelligence officials, with a 2014 hack of Yahoo that affected 500 million accounts. The U.S. cla... More

How to Catch Hackers? Old-School Sleuthing, With a Digital Twist (NYT)

Bank robbers wear masks and escape in vans with stolen license plates. Kidnappers compose ransom letters from newsprint to elude handwriting experts. Burglars target houses with th... More

MEMBERS