5 Must-Read Cybersecurity Articles, February 2016

The entire cybersecurity industry has been looking at cyberdefense in the wrong way and frankly has used the wrong technologies in the wrong place when addressing it.
~Larry Karisny

While the Apple/FBI privacy case is dominating mainstream news headlines – and journalists are getting hacked writing about it – there is plenty going on in the Cybersecurity world.

It can be difficult to keep up with the latest news, so, to help cut through the clutter, here are five must-read Cyber Security and Identity Management articles from the past two weeks.

 

1. Bringing Innovation into Cyberdefense Technologies via GovTech

Hackers immediately use or develop for their purposes the best hacking technology out there. It is this same innovative thinking we must use in approaching our cyber defense technologies. Read more >>

 

2. What did we learn about cybersecurity in 2015? via CIO

Organizations around the world suffered over 700 data breaches in 2015. Your organization may have escaped 2015 without a data breach. But that’s no guarantee that hackers, cybercriminals and others won’t turn their attention to your business soon. Read more >>

 

3. A new Android banking trojan is also ransomware via CSO

A new kind of Android malware steals online banking credentials and can hold a device’s files hostage in exchange for a ransom, delivering a particularly nasty one-two punch. Read more >>

 

4. 17 governors sign pledge to modernize US power grid via UtilityDive

Governors of more than a dozen states are committing to modernize their energy infrastructure, plan for an “energy transition,” clean up the transportation sector and bring transmission into the 21st century. Read more >>

 

5. Meet Wanda, device for home health cybersecurity via MedCity News

In an effort to help patients configure home medical devices and to protect related healthcare data from security risks, a group from Dartmouth College has developed a digital “magic wand” for securely connecting devices to Wi-Fi networks. Read more >>

 

If you enjoyed these articles, signup to receive the Idenhaus Cybersecurity Newsletter delivered to your inbox.

Subscribe to our mailing list

* indicates required




You may also like…

Does your Identity Management Program Pass the ‘Marshmallow Test’?

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top