Data breaches are costing businesses millions

New research explores the hidden costs of mega breaches.

Cyber attacks cost UK’s large organisations average £1m per attack

A report by a UK government body worked out that the average cost rose for both large and small businesses with the overall trend showing that attacks in fact decreased.Read more: http://www.itproportal.com/2014/04/30/cyber-attacks-cost-uks-large-organisations-average-1m-attack/

2014 Hack Retrospective, Or Why Security Ecosystems Matter

The “Year of the Hack” will probably be one way that 2014 will be remembered. But it actually began in 2013 with a phishing email. There are clues to how hacks that began in 2013 (some even earlier) continue to reverberate, even as we begin into a New Year. Read More

YC-Backed Cymmetria Uses Virtual Machines To Decoy And Detect Hackers

YC-backed Cymmetria, which is uncloaking from stealth now after around a year working its cyber security startup business,

So You’ve Been Breached

Breaches happen the way Hemingway said you go bankrupt: gradually then suddenly.

Following Massive Data Breach, Target CEO Resigns

Following the massive data breach that saw as many as 70 million Target customers’ personal information stolen, along with 40 million credit and debit cards,

Adapting To The Changing Global Enterprise Security Landscape

The finishing touches of the European Union General Data Protection Regulation (GDPR) are underway, and with it, many international companies that have data passing through the EU,

Why multi-layered protection might be the only security you can trust

Rising security risks and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. So how can you choose a solution that works?Read more: http://www.itproportal.

Employee Data Breach The Worst Part Of Sony Hack

The Sony hack has taught us so much. It’s taught us to send corporate email as if everyone is reading those emails. It’s taught us that people in Hollywood are just as mean as people in any other industry (and potentially racist).

Cybersecurity Hindsight And A Look Ahead At 2015

Editor’s note: Yoav Leitersdorf and Ofer Schreiber are partners at YL Ventures, which invests early in cybersecurity, cloud computing, big data and Software-as-a-Service software companies.This year we witnessed a series of high-profile security breaches,

EU Data Protection Directive: How to minimise your financial risk

The EU's Data Privacy Act is expected to reach final agreement in 2015 and will require many companies to overhaul the way they store and transfer information. Are you ready? Read more: http://www.itproportal.com/2014/08/27/eu-data-protection-directive-how-to-minimise-your-financial-risk/

UK government plans Internet regulator

Proposed Internet regulator would hold tech giants accountable for content published on their platforms.

Salesforce brings voice to CRM with new Einstein Voice Assistant

Salesforce users can now obtain valuable data and insights with only their voice.

UK employees feel remote working guilt

Half of UK employees working remotely feel pressure to prove their working.

Painting by numbers: developing the real productivity picture

Could technology and data analytics be used to improve not only the workplace but also an organisation's employees?

Protecting your digital identity from hacks and breaches

As our identities become increasingly digital, protecting them from cyber threats has never been more important.

Six reasons an arts degree is an ideal springboard for a career in IT

The soft skills learned at a liberal arts college actually translate quite well to the field of IT.

UK company emails being hijacked for phishing

Victims are usually clueless they're being attacked.

Why ERP is the key to unlocking the future of retail

ERP systems provide retailers with the features and functionality needed to process drop shipping orders efficiently and effectively.

How can manufacturers deliver in the share economy?

Below are a few key tactics manufacturers can use to ensure the transition to car sharing services is as smooth and profitable as possible.

You are what you eat - How blockchain can help us understand where our food comes from

Over the years, there have been a number of food scandals that have rocked consumer confidence in the food industry.

发布前一瞥:360路由与迅雷路由

今日下午,360 召开了关于 360 安全路由发布前的媒体交流分享会,公布了即将发布的路由配置: 企业级 AR9344 533MHz 处理器,128 RAM,802.11AC 并支持 2.

隐私手机 Blackphone 能成为大众消费品么?

尽管科技让我们无时无刻地处于一个无处隐匿的环境,但这并没有阻挡人们继续使用技术工具。有人拿我们的资料卖钱,当然也有人制造出捍卫我们隐私的武器。

中国手机销售商明年或获全球超过一半市场份额

据国外媒体报道,来自美国研究公司ABIResearch的最新研究报告称,到2015年,中国大陆手机销售商将占据全球手机销量的50%以上。

美国研究人员发现一种分子能直接剪断DNA摧毁癌细胞

日前,美国耶鲁大学的研究人员发现一种由海洋细菌产生的物质能够通过破坏DNA的方式杀灭癌细胞,新发现为低剂量化疗药物的研发铺平了道路。相关论文发表在5月11日出版的《自然·化学》杂志上。

这功能逆天 神奇手套让你不知不觉学会钢琴

人人都羡慕过那些优雅地弹着钢琴的大触,可惜这技能并不是想学会就能学会的。谷歌眼镜的负责人 Thad Starner 日前又弄出了一样超科技 —— 一双能够让你学会弹钢琴的手套。  

European Entrepreneurs Step Up To The Ice Bucket Challenge

The Ice Bucket Challenge has wended it’s way around the world and is now gradually hitting the European tech startup community. After a little encouragement from my own attempt the duly nominated Alicia Navarro,

为什么回测效果非常好的策略实盘却不行?

1.交易的冲击成本是非常重要的一个因素。从实际经验来说,交易的冲击成本会比你盘面上看到的那些成交量所感觉到的冲击成本大得多。一个日成交亿元的创业板股票,你成交个10%左右可能就需要打高2个点左右。

又有片睇!用狙擊槍「射殺」iPhone 6 Plus

唔知點解有咁多人鍾意虐待 iPhone 6 Plus,例如較早之前用攪拌機攪碎該款新手機的 RatedRR,其實同時亦進行了一項實彈射擊測試。咁到底這部 iPhone 6 Plus 最後又可唔可以幸免於難呢?以下有更多資料:The post 又有片睇!

市场调研显示:Windows 7市场份额独占鳌头

调研机构Net Applications近日针对市场上的操作系统和浏览器进行了一系列调研。操作系统调研数据显示 […]

[多图]只需两条白线:2D立刻变3D

平面照片如何转出3D效果?很多图像编辑软件都有这样的功能,但技术和操作上比较复杂,效果也不尽如人意,毕竟照片天然就是2D的,就像普通电影用再怎么高超的技术转换3D,都不会太好看。

© 云聚网互联网资讯 我要投稿 云聚网博客 7秒MCN大数据平台