cybersecurity

  • Transcending Borders Through Technology Crunch Network

    Transcending Borders Through Technology

    As is clear from the front pages of newspapers recently, we are living in a world where open democratic values are under attack. Paris, Bamako, San Bernardino, Jakarta and Ouagadougou have all been targeted by terrorists. At the same time, we are in the midst of a technological revolution that is reshaping our society. The Internet of Things is driving a whole new way for businesses to… Read More

  • Security And Privacy Standards Are Critical To The Success Of Connected Cars Crunch Network

    Security And Privacy Standards Are Critical To The Success Of Connected Cars

    The automotive industry is rapidly evolving to transform the car from a simple mode of transport to a personalized information hub: There will be an estimated 220 million connected cars on the road globally by 2020. Each of those cars will be equipped with more than 200 sensors, more than double the number of sensors in connected cars on the road today. Read More

  • Cybersecurity Investing In Israel By The Numbers Crunch Network

    Cybersecurity Investing In Israel By The Numbers

    With the cybersecurity market growing to a gigantic size, it is well established that Israel is a hotbed of innovation and startups in the space. The end of then year is a good time for summaries and wrapping things up, so I took a look at statistics as gleaned from the database of IVC to put some quantitative observations behind this major wave. Read More

  • Why Cloud Computing Will Shake Up Security Crunch Network

    Why Cloud Computing Will Shake Up Security

    As the curtain opens on 2016, you can expect massive changes in the security landscape. Technology providers such as firewall vendors, switching vendors and others will fade as new solutions better suited to the cloud computing environment emerge. On the flip side, companies that provide encryption and anti-malware technologies will continue to see their fortunes rise because the demand… Read More

  • Cockroaches Versus Unicorns: The Golden Age Of Cybersecurity Startups Crunch Network

    Cockroaches Versus Unicorns: The Golden Age Of Cybersecurity Startups

    Many security startups are not unicorns; rather, they are cockroaches — they rarely die, and  in tough times, they can switch into a frugal/consulting mode. Like cockroaches, they can survive long nuclear winters. Security companies can be capital-efficient, and typically consume ~$40 million to reach break-even. This gives them a survival edge — but VCs are looking for a… Read More

  • Where Are All The Women In White Hats?

    Where Are All The Women In White Hats?

    America needs cyber talent — especially among women. Without a capable workforce to secure the smartphone in your hand or the highly classified networks our government operates within, our economy and national security will be at risk. We need to nurture a pool of interested young men and women to go into science, technology, engineering and math (STEM) programs. The troubling news is… Read More

  • Meet Knightscope’s Crime-Fighting Robots

    The robots might one day rise up and take over, but a Mountain View startup called Knightscope has developed a fleet of crime-fighting machinery it hopes to keep us safe. Knightscope’s K5 security bots resemble a mix between R2D2 and a Dalek from Doctor Who – and the system behind these bots is a bit Orwellian. The K5’s have broadcasting and sophisticated monitoring… Read More

  • Presidential Candidates Must Articulate Decisive Cybersecurity Plans Crunch Network

    Presidential Candidates Must Articulate Decisive Cybersecurity Plans

    Traditionally, physical security and cybersecurity have been considered two separate entities. The cybersecurity threat, while significant, was often relegated to the sphere of enterprises, individual privacy, intellectual property loss and financial theft. Physical security, on the other hand, meant potential risk to human safety and lives — and was naturally taken more seriously. Read More

  • Humility, Accountability And Creative Thinking Can Fix IT Security Crunch Network

    Humility, Accountability And Creative Thinking Can Fix IT Security

    The state of cybersecurity has reached full-blown systemic failure. The narrative goes something like this: Companies are spending massive amounts of money on technologies that don’t seem to be living up to their marketing messages. According to Gartner, $80 billion will be invested in IT security products in 2015 alone. Yet breaches persist. While it’s always easier to point out… Read More

  • Six Lessons From Cybersecurity Superhero Training Crunch Network

    Six Lessons From Cybersecurity Superhero Training

    One of my distinct grade-school memories is filing out of fourth grade class, nervous, but excited to miss a portion of math class. We were having our quarterly disaster-survival drill; instructing students on what to do in case disaster strikes. While working through yet another attempted malicious cybersecurity attack it dawned on me, why can’t we apply this diligence and training… Read More

  • Cybersecurity Firm iboss Raises $35M From Goldman Sachs, Looks Toward IPO

    Cybersecurity Firm iboss Raises $35M From Goldman Sachs, Looks Toward IPO

    After 10 years without any outside investment, cybersecurity firm iboss is finally raising its Series A. The company’s CEO said that even now, the company, which has been profitable since it launched, really “didn’t need the money.” The cloud-based security platform just raised a $35 million Series A from Goldman Sachs’ Private Capital Investing group. Read More

  • Why IoT Security Is So Critical Crunch Network

    Why IoT Security Is So Critical

    Twenty years ago, if you told me my phone could be used to steal the password to my email account or to take a copy of my fingerprint data, I would’ve laughed at you and said you watch too much James Bond. But today, if you tell me that hackers with malicious intents can use my toaster to break into my Facebook account, I will panic and quickly pull the plug from the evil appliance. Read More

  • Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Years after Google implemented a similar feature for Gmail users, Facebook says it will begin alerting users if it suspects they’re a target of state-sponsored attacks. That is, if the network believes a user’s account has been either targeted or already compromised by an attacker working on behalf of a nation-state, Facebook will pop up a notification warning them of the incident… Read More

  • Good Humans Are Crucial For Beating Bad Humans Crunch Network

    Good Humans Are Crucial For Beating Bad Humans

    The difficulty in figuring out who, exactly, is behind cyber attacks creates a vacuum typically filled by technological finger pointing. The software exploited, network abused or malware used come under intense scrutiny, distracting from the people responsible. Read More

  • Who Will Step Up To Secure The Internet Of Things? Crunch Network

    Who Will Step Up To Secure The Internet Of Things?

    The Internet of Things (IoT) presents a significant mix of opportunity and risk. Compared to the connected devices of the past, the gazillions of new IoT devices that are being predicted for our homes, transportation, cities, medical devices and elsewhere represent a unique set of security challenges for both companies and their users. They also offer a host of new and attractive opportunity… Read More

  • Women Could Be The Solution To Fighting Cybersecurity Threats

    Women Could Be The Solution To Fighting Cybersecurity Threats

    Cybersecurity professionals are more in demand than ever before, but a new report finds the number of women in the field hasn’t grown. Women represent just 10 percent of the cybersecurity workforce, according to a report released today by (ISC)², a nonprofit specializing in information technology and Booz Allen Hamilton. This figure has remained unchanged for two years. Read More

  • Wearables: A Pandora’s Box For Security? Crunch Network

    Wearables: A Pandora’s Box For Security?

    As many have noted, we’re entering a new era where wearable gadgets — from watches and fitness bands to glasses and health aids — are at the forefront of the new technological revolution. A PricewaterhouseCooper’s report found that more than 20 percent of U.S. adults already own at least one wearable, and estimates that soon we’ll be using them at home and work… Read More

  • To Fix Cybersecurity Law, Ask More Questions Crunch Network

    To Fix Cybersecurity Law, Ask More Questions

    When a company realizes that it may have been hacked, its first call often is not to outside forensics consultants, security firms or even to law enforcement. Too often, the company first must consult with its lawyers. Lots and lots of lawyers. And for good reason. Our system of cybersecurity and privacy laws is difficult to navigate, and exposes companies to large penalties for failure to… Read More

  • Here Is How To Address Car Hacking Threats Crunch Network

    Here Is How To Address Car Hacking Threats

    When you connect a car to the Internet, it is no longer just a car: It is a computer on wheels. When a car can search Google, send tweets and be remotely accessed from a smartphone app, that car has more in common with your laptop than it does the Model T. Securing the next generation of connected automobiles means redefining what it means for a vehicle to be “road-ready.” The… Read More

  • This Could Be The Year Of The University Hack Crunch Network

    This Could Be The Year Of The University Hack

    You’re a college freshman relishing in your newfound freedom. You wake up in your cramped dorm room, roll over and grab your laptop to check Facebook — but when you type in your password, it’s rejected. Slightly annoyed, you pull on some clothes, grab your backpack and head to the local coffee shop, where your credit card is promptly declined. Frazzled and in desperate need… Read More

  1. 1
  2. 2
  3. ...