Home Authors Posts by cyberparse


Our purpose is to provide the right information to our readers. For obvious reasons, our information journey will of couse be ever changing, but from the outset we plan on the following: Break down and communicate knowledge relating to Cyber Crime, Cyber Security, Information Security and Computer Security. Use Risk Management practices to help in translating the technical aspects of the Risks, Threats and Vulnerabilities into business language. Communicate the appropriate Controls necessary to reduce the Impact and Probability. We will do this by: Identifying, collating and providing relevant information. Highlighting relevant News articles. Investigating trends and providing Analysis. Providing How-to tips and tricks to reduce the Threats and Vulnerabilities. Offering Products and Solutions designed to mitigate or defend against the risks. ------ Joe Woods, Editor and CTO

Russian-controlled telecom hijacks financial services’ Internet traffic

Visa, MasterCard, and Symantec among dozens affected by "suspicious" BGP mishap.

IDG Contributor Network: EdgeX Foundry is the solution the IoT world...

IoT (internet of things) is playing a very critical role in the industrial and enterprise space.
It’s being used by shipping companies track containers.
It’s being used in massive warehouses for better usage of space.
It’s being used in factories, construction sites and mines to improve safety of workers.

There are so many use cases.It's gradually maturing in the consumer space also, though it’s largely plagued by security concerns for various reasons, mainly by the lack of a business model.One challenge that is common across the board -- from industrial IoT to enterprise and consumer IoT -- is the lack of any standard based platform or framework.
IoT companies are doing their own things, duplicating efforts, writing their own code, their own protocols, creating fragmentations and interoperability challenges as they do all of the above.To read this article in full or to leave a comment, please click here

Facebook decides fake news isn’t crazy after all. It’s now a...

Once dismissed by Zuck, misinformation now merits revised security strategy Analysis  Last November at the Techonomy Conference in Half Moon Bay, California, Facebook CEO Mark Zuckerberg dismissed the notion that disinformation had affected the US presidential election as lunacy.…

New analysis relocates the “hobbit” on the human family tree

Were humans migrating out of Africa much earlier than we realized?

Acer debuts see-through trackpad gaming laptop and a slew of affordable...

The company's big annual event brought updated laptops for all.

Annual Verizon security report says sloppiness causes most data breaches

Security threats are constantly evolving, but as Verizon's latest DBIR (Data Breach Investigations Report) shows, the more things change in information security, the more they stay the same.More than half (51 percent) of the data breaches analyzed i...

Windows 7 update lockout claims older Intel, AMD processors

Microsoft continues to shoot itself in the foot with buggy detection software, no documentation, and an infernal drive to block Windows Update on seemingly random machines. Now, some older Intel and AMD processors are unexpectedly getting the blocka...

Senior official: NASA will delay first flight of new SLS rocket...

The space agency is now likely to miss Congress' original deadline by three years.

BrandPost: Are You Burying Your Head in the Sand? It’s Your...

By Gary Thome, VP and chief engineering at HPE, Software-defined and Cloud Group In today’s digital world, data is the new oil.

And like oil, data must be gathered and refined in order to extract value from it. Your business is probably doing just that -- gaining a treasure trove of information that helps you become more competitive.If data is indeed that valuable, it makes sense to be vigilant in protecting it. Yet, when you put your data in the public cloud, have you considered that you may be giving up a fair amount of control? To investigate this claim, consider three key concerns in the public cloud: protection, compliance/data sovereignty, and legal issues.To read this article in full or to leave a comment, please click here

OWASP Top 10 Update: Is It Helping to Create More Secure...

What has not been updated in the new Top 10 list is almost more significant than what has.

New OWASP Top 10 Reveals Critical Weakness in Application Defenses

It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.

Chrome to Mark More HTTP Pages ‘Not Secure’

Starting with Chrome 62, Google will start marking any HTTP page where users may enter data, and any HTTP page visited in incognito mode