recentpopularlog in

jonerp : hacking   5

Why Businesses Should Start Prioritising Cybersecurity
"Ransomware attacks on such a massive scale seem to happen at least once a month nowadays. The entire American city of Baltimore was “held hostage” in May. A similar incident happened in Greenville, North Carolina the previous month.

Massive attacks aside, cybercriminals tend to target small businesses due to fewer investments in their cybersecurity infrastructure. It’s predicted that a new organization will be affected by such an attack every 11 seconds as soon as 2021."
"blogs  breaches  cyber  security  cybersecurity  hacking  proprivacy  ransomware  smb  sme  vpn  wi-fi  wpa2 
10 weeks ago by jonerp
Does Disney need a security princess after claims Disney+ hacked?
"The same is true of hacking attacks. It really doesn’t matter who is at fault. The immediate response to blame the victims is not what customers would have expected. Disney will now have to prove that it was not at fault and do so quickly. Using a third-party forensics team to establish what happened is a must. So is finding some way to help those customers regain access to their accounts."
latest  news  security  cybercriminals  disney  forensics  hacking  malwarebytes  ralph  streaming  service 
november 2019 by jonerp
Fear and loathing at RSA — Hacking, security and the limits of protection - by @ron_miller
"It’s easy to forget that none of this tends to happen in isolation, yet companies tend to feel isolated. Instead of banding together against a common enemy, they instead try to fight alone. In many ways it doesn’t make sense to take this approach, but companies which don’t want to be seen as having weak security in the eyes of the public, likely don’t understand that on some level everyone is equally vulnerable."
enterprise  security  tc  rsa  hacking  cyber 
march 2016 by jonerp
Mossberg: An Encryption ‘Backdoor’ Is a Bad Idea
"I understand their exasperation, but not their proposed solution: Forcing American companies, notably Apple and Google, to build “backdoors” into their encrypted smartphones that would allow the government access. This would be a huge change, because both companies have introduced whole-device encryption that even they can’t decrypt. It would also be a huge mistake."
commentary  data  breach  security  network  online  hacking 
december 2015 by jonerp
'Growth Hacking' Makes Me Twitch - 5 Lessons For Enterprises - by @steinburglar
"f there is one area where marketers excel, it’s continually redefining and rebranding the role of marketing itself. As a marketer at heart, I appreciate the continual innovation yet sometimes cringe at the latest and greatest buzzwords and emerging new job titles. The latest title that has caught my fancy and that of Silicon Valley over the last couple years is “growth hacker.”
growth  hacking 
march 2015 by jonerp

Copy this bookmark:

to read