Safe drinking water is a necessity for protecting public health and safety. Water systems in the United States perpetuate all human activity and properly treated wastewater is vital for preventing disease and protecting the environment. The security and protection of drinking water, wastewater treatment services, and collection systems are essential to the American way of life and the nation’s economy.
Quelle: Protecting vital water infrastructure
TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use
Quelle: How to prevent your mobile app from getting hacked
Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises will be reimbursable if not met. Bluelock’s Brandon Jeffress reviews what is essential to be in an ironclad SLA.
Quelle: What’s in the fine print of your disaster recovery vendor agreement?
Your developers are using open source — even if you don’t know about it. Here’s how to take control and why you need to.
Quelle: How to track and secure open source in your enterprise
Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.
Quelle: Failure to communicate helps ransomware prosper
“A hacker claims to have stolen the upcoming season of Netflix’s hit series ‘Orange Is The New Black,’ and is demanding that the video streaming service pay an unspecified r…
Quelle: Hacker steals upcoming season of Netflix series Orange is the New Black
From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, here are some security- and privacy-centered gadgets you’ll want to keep handy
Quelle: 9 essential tools for the security-conscious mobile worker
There’s a common misconception that threat intelligence is just about catching attacks before they happen. Here’s what’s wrong with that assumption.
Quelle: The Cyber Attack Kill Chain: Where Threat Intelligence Can Help
The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.
Quelle: U.S. military wants white-hat hackers to target its cyber security systems
While this month’s list is long, there doesn’t seem to be as many records leaked as in previous months. I’m still searching deeper to find the total number of records affected, but at the moment we…
Quelle: List of data breaches and cyber attacks in April 2017