Subscribe: Forbes.com: Security
http://www.forbes.com/security/index.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cards reported  cloud  company  cybersecurity  data  duration  management  networks  new  reported duration  reported  risk  security  size 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Forbes.com: Security

Forbes - Security



Forbes - Security



Copyright: Copyright 2017 Forbes LLC
 



The Problem With Uber Lies Within Its Own Management

Mon, 24 Apr 2017 13:40:00 -0400

This ridesharing giant has got more than wretched luck to blame for its situation, be it the toxic workplace environment, the bad press or the resignation of its top executives. The problem with Uber lies within its own upper management.


Media Files:
https://blogs-images.forbes.com/haroldstark/files/2017/04/uber-1200x800.jpeg?width=0&height=600




The Next Big Android Update Will Be Even Better At Fighting Ransomware

Mon, 24 Apr 2017 11:30:00 -0400

Fears about malware outbreaks on devices that run Android are largely overblown, but serious threats do exist. That's why Google is making sure Android O will provide you with improved protection against ransomware.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2017/02/pixel.jpg?width=0&height=600




NetApp's CIO Helps Drive Company's Shift From Data Storage To Data Management

Mon, 24 Apr 2017 09:45:00 -0400

Bill Miller has been a CIO three times over, in each case with tech-centric companies. He is currently the CIO of NetApp, and he is one of the executives driving the company's change from a data storage company to a data management company. He highlights IT's role and the value derived.


Media Files:
https://blogs-images.forbes.com/peterhigh/files/2017/04/Bill-Miller-NetApp-CIO-v2-300x127.jpg?width=0&height=600




SAPVoice: How Internet of Things Is Saving Lives And Transforming Nations

Mon, 24 Apr 2017 08:17:00 -0400

The Internet of Things is keeping people safe on construction sites - and that's just one example of how technology is helping a region diversify its economy and improve people's lives


Media Files:
http://img.youtube.com/vi/z9wFKh7TLaA/0.jpg




2017 State Of Cloud Adoption And Security

Sun, 23 Apr 2017 12:00:00 -0400

Hybrid cloud adoption grew 3X in the last year, increasing from 19% to 57%. In 15 months, 80% of all IT budgets will be committed to cloud solutions. These and many other insights are from the recently published report, Building Trust in a Cloudy Sky: The State of Cloud Adoption and Security .


Media Files:
https://blogs-images.forbes.com/louiscolumbus/files/2017/04/80-of-the-budget-is-cloud-computing.jpg?width=0&height=600




How Marketers Can Help Protect Their Firms From A Cybersecurity Attack

Sat, 22 Apr 2017 22:52:00 -0400

As part of a series exploring cybersecurity and its impact on consumers, marketers, and marketing, I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business. This article focuses on how marketers can help protect their firms from a cybersecurity attack.


Media Files:
https://specials-images.forbesimg.com/imageserve/38625673/0x600.jpg?fit=scale




IBM Should Buy Some Damn Revenue

Sat, 22 Apr 2017 10:29:00 -0400

IBM needs revenue and the best way to increase revenue is to buy it. It should be aggressive in its M&A strategy -- far more aggressive than it's been to date.


Media Files:
https://specials-images.forbesimg.com/imageserve/655686826/0x600.jpg?fit=scale




This Apple Phishing Site Is As Sneaky As They Come

Fri, 21 Apr 2017 15:00:00 -0400

Scammers employ a number of insidiously clever methods to trick you into handing over sensitive personal data. Few are harder to detect than this one.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2017/04/apple-phish.jpg?width=0&height=600




Don't Shoot The Messenger: Cylance Didn't Break AV Testing

Fri, 21 Apr 2017 14:47:00 -0400

The methods Cylance uses to create virus files to test and compare products has caused some controversy and is shaking up the way the industry evaluates endpoint security solutions.



San Diego Aims to Set the Pace for Smart City Networks

Fri, 21 Apr 2017 14:31:00 -0400

The announcement by the City of San Diego that it will deploy over 3,000 smart sensors as part of an ambitious upgrade to its street lighting system provides evidence that we are on the cusp of a new phase for smart street lighting and city networks.


Media Files:
https://blogs-images.forbes.com/pikeresearch/files/2017/04/San-Diego-300x200.jpg?width=0&height=600




What Fukushima Disaster Taught Me About Risk Management In Cybersecurity

Thu, 20 Apr 2017 23:23:00 -0400

Risk is something everyone deals with on a daily basis. Risk also manifests itself in many ways and one can learn/apply lessons from different areas to another. Cybersecurity is now fundamental requirement of today's ICT society and the risk in not doing has many implications.


Media Files:
https://specials-images.forbesimg.com/imageserve/162946153/0x600.jpg?fit=scale




Shlomo Kramer's Cato Networks Out To Redefine Networks And Security, Again

Thu, 20 Apr 2017 14:19:00 -0400

When Schlomo Kramer speaks people listen--at least when it comes to networks and security. He's founded several companies including his first, Checkpoint, in his grandmother's apartment in the early 90's that now has a market cap of more than $18 billion. Now he's at it again with Cata Networks


Media Files:
https://blogs-images.forbes.com/brucerogers/files/2017/04/ShlomoKramer.jpg?width=0&height=600




SAPVoice: Blockchain Will Radically Disrupt Your Supply Chain: 4 Steps To Take Now

Thu, 20 Apr 2017 08:32:00 -0400

Blockchain epitomizes network-centric business, and here's how procurement departments need to take the lead exploring its possibilities for supply chain disruption.


Media Files:
https://blogs-images.forbes.com/sap/files/2017/04/SAPAribaLive_Kain_Forbes_blockchain.jpg?width=0&height=600




Google Building An Ad Blocker Into Chrome Isn't As Crazy As It Sounds

Thu, 20 Apr 2017 08:21:00 -0400

At its core, Google is an advertising company. That's why news that it wants to ship a built-in ad blocker with the Chrome web browser sounds so strange.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2017/01/google-chrome-tablet.jpg?width=0&height=600




Why You Must Build Cybersecurity Into Your Applications

Thu, 20 Apr 2017 06:49:00 -0400

Now that all companies are software companies, there will be 111 billion new lines of code written this year. An automated approach to secure application development and delivery is critical, whether that application runs in the cloud, in a container or on premises.


Media Files:
https://blogs-images.forbes.com/danwoods/files/2017/04/Jeff_Williams_Headshot_17B1875_SQ1_Web-300x300.jpg?width=0&height=600




2 Big Reasons To Sell IBM Stock

Wed, 19 Apr 2017 15:52:00 -0400

Warren Buffett is smarter and richer than I will ever be. But there are two compelling reasons he should cut his losses in IBM.


Media Files:
https://specials-images.forbesimg.com/imageserve/667265834/0x600.jpg?fit=scale




Hack Of 1.7M Snapchat Accounts Didn't Actually Happen

Wed, 19 Apr 2017 13:00:00 -0400

Recently, a group of hackers announced that they had swiped data on 1.7 million Snapchat users. That's a small fraction of the app's 160 million daily users, but it's still an alarming revelation... if it's true.


Media Files:
https://specials-images.forbesimg.com/imageserve/39971308/0x600.jpg?fit=scale




The Cost Of Cyber Breach -- How Much Your Company Should Budget

Wed, 19 Apr 2017 09:35:00 -0400

Cyber risk must be understood in dollars and cents to communicate in a language that the board and executives understand. Only then can senior executives have a cyber strategy that allows them to protect the assets properly.


Media Files:
https://blogs-images.forbes.com/christopherskroupa/files/2017/04/fotolia_78390654-e1492607594856.jpg?width=0&height=600




Extreme Cybersecurity Visibility: You Can't Secure What You Can't Measure

Wed, 19 Apr 2017 06:29:00 -0400

Companies need a centralized wayto gain deep visibility into their entire security environment, both on premises and in the cloud, using advanced analytics on all their security tools and network traffic.


Media Files:
https://blogs-images.forbes.com/danwoods/files/2017/04/Paul-Hooper-227x300.jpg?width=0&height=600




Facebook Just Took A Giant Leap To Becoming The Global Password Manager For Web And Apps

Tue, 18 Apr 2017 21:57:00 -0400

One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the blueness ... bind them.


Media Files:
https://blogs-images.forbes.com/johnkoetsier/files/2017/04/woman-1446557_1920-500x500.jpg?width=0&height=600




iOS 10: How Secure is Apple's Closed-Ended Operating System?

Tue, 18 Apr 2017 18:50:00 -0400

For almost an entire decade, Apple's range of devices has represented the world's best in security infrastructure. But, on a closer look, just how safe is the new iOS 10.3, really?


Media Files:
https://blogs-images.forbes.com/haroldstark/files/2017/04/ios-1200x800.jpg?width=0&height=600




How Shifting Government Policies Affect Your Company's Cybersecurity Program

Tue, 18 Apr 2017 12:59:00 -0400

The new administration has been in high gear, introducing and repealing legislation that could impact your cybersecurity planning. How do these changes affect your organization?


Media Files:
https://specials-images.forbesimg.com/imageserve/39909604/0x600.jpg?fit=scale




Why Vulnerability Management?

Tue, 18 Apr 2017 09:00:00 -0400

A robust security program -- particularly one focused on vulnerability management -- doesn't have to be a daunting proposition.


Media Files:
https://specials-images.forbesimg.com/imageserve/617690744/0x600.jpg?fit=scale




As The March For Science Approaches, Take 'The 20-Second Science Challenge'

Tue, 18 Apr 2017 08:43:00 -0400

Can you take the 20-Second Science Challenge? It is a fun way to highlight science and points to 3 messages that hopefully come through at The March for Science.


Media Files:
https://specials-images.forbesimg.com/imageserve/e786b3e8b4214cbdba5383526a9c6214/0x600.jpg?fit=scale




This Harvard Alum Wants To Disrupt The College Savings Industry

Tue, 18 Apr 2017 08:02:00 -0400

80% of parents don’t know what a 529 plan is, and 60% of those saving for college don’t use one. This Miami startup is trying to change that.


Media Files:
https://blogs-images.forbes.com/zackfriedman/files/2017/04/MARCOS-CORDERO-e1492456354527.jpg?width=0&height=600




United Airlines Stock Is On A Diverted Flight

Mon, 17 Apr 2017 22:24:00 -0400

United’s stock fell 1.1% following the forceful "bumping" (or "re-accommodation") of a United Airlines passenger hit social media last week, wiping out $255 million off the airline’s market cap. Cartoon by Ed Hall.


Media Files:
https://blogs-images.forbes.com/cartoonoftheday/files/2017/04/170414HallExcerpt-500x500.jpg?width=0&height=600




This Isn't Your Grandma's Rotary Phone! 39 Cartoons On How Technology Changed Literally EverythingThis way to the tech toons ...How Wikipedia Is Making Kids Dumber Than EverYes. But Would A Car Want To Drive Itself?Smartphones Are The New Heroin For TeensIf 1930s Germany Had TwitterThe No. 1 Reason We Spread Fake News (Even When We Know It's Fake)Worried the CIA Hacked Your Smart TV? Here's What They Know About You Now#NetflixAndChill ... 5 Years LaterThe No. 1 Reason Nobody Understands Virtual RealityThe One Sure Way To Get Your Kickstarter CrowdfundedUber, But For CatsThe Government Can't Take What You Give Away For Free'Smart Clothes' Will Improve And/Or Ruin Your LifeThe No. 1 Quality Future Employers Want In A Job CandidateFinally! An 'American Ninja' Competition For The Netflix Warrior In Us AllHow To Reboot Your Child For The Digital AgeBig Brother Is Watching You ... From Your ToasterVictimized By An Airbnb Racist? Good Luck With That ...'Pokémon GO': Expand Your World, Meet New People, Get Robbed By ThemNever Too Young To Learn Password Protection!Samsung's New Galaxy Note 7 Is The BombHappy Anniversary Apple! Here's To 10 More Years Of iPhone-Related DistractionAs Robots Are Able To Do More Jobs, What's Left For Humans?Driverless Cars Are Missing A Human TouchMating Rituals Of Silicon ValleyCatfishing: Another Concern Of Video Job InterviewsHarriet Tubman $20 Bill In The Era Of Apple Pay'Observing And Recording' The Cops Comes With LimitationsHow Slack (And Open-Office Design) Is Transforming Workplace CommunicationHow To Answer Dumb Interview Questions (In Silicon Valley)What Do Women Want From Video Games?Keep Calm And Play 'Pokémon GO'How Office Robots May Put Your Job At Risk In Ways You Haven't ImaginedThe Ultimate First World ProblemPrince Fans Pay Tribute By Paying For His MusicHe's A Mac, He's A PC ... And That's The FBIStar Wars' BB-8 Takes The FieldRoger Goodell Isn't Dead, But The NFL Needs A New Twitter PasswordHulk Hogan's Big WinHillary Clinton's Private Email Server Is Still A Thing

Mon, 17 Apr 2017 22:24:00 -0400

Americans love privacy so much, weshare it with everyone. Cartoon byChris Britt.

Back in the day, co-workers used to email each other rather than leaning over the cubicle wall. Times certainly have changed ... or have they?


Media Files:
https://specials-images.forbesimg.com/imageserve/582e1df7a7ea431d601989ba/0x600.jpg?fit=scale&background=000000




Cyber Security Refocused -- Advanced Persistent Security

Mon, 17 Apr 2017 16:22:00 -0400

We have to assume failure is going to happen—protection will fail. Once protection fails, you need to ensure that you’ve put detection in place, and when you put detection in place, you look for where your protection has been breached. When you find it, you implement a reaction plan.


Media Files:
https://blogs-images.forbes.com/christopherskroupa/files/2017/04/Fotolia_112196100_Subscription_Monthly_M-1200x696.jpg?width=0&height=600




Big Retail Breaches 2014SupervaluMichaelsNeiman Marcus

Mon, 17 Apr 2017 16:22:00 -0400

Size: Unknown

First Reported: 10/20/2014

Duration: Unkown

Size: Unknown

First reported: 10/10/2014

Duration: Sept 2014

Size: 56 million cards

First reported: 9/2/2014

Duration: April-Sept 2014

Size: 868,000 credit cards

First reported: 7/21/2014

Duration: Feb-Aug 2014

Size: Unknown

First reported: 8/14/2014

Duration: June-July 2014/Aug-Sept 2014

Size: 3 million cards

First reported: Jan 25, 2014

Duration: May 2013 - Jan 2014

Size: 350,000 cards

First reported: Jan 10, 2014

Duration: July-Oct 2013


Media Files:
https://specials-images.forbesimg.com/imageserve/70891ba2faed27274d2d82a586ca6d82/0x600.jpg?fit=scale&background=000000




Chrome And Firefox Adding Protection Against This Nasty Phishing Trick

Mon, 17 Apr 2017 11:00:00 -0400

Cleverly-designed phishing attacks pose the single biggest threat to your security. That's why Google and Mozilla are working on a way to protect you from one particularly nasty trick that scammers employ.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2016/12/phishing.jpg?width=0&height=600