Software updates are critical, so automate them

Why do we need to update our software, anyway? Well, the first thing to understand is that there are different kinds of updates. Some of them add new features or improve existing ones. Others make your software compatible with other programs, different protocols, new or updated operating systems, and so forth. With greater compatibility you’ll…

5 apps for encrypting and shredding files

While safeguarding personal and business data has always been important, the necessity for maintaining digital privacy has become even more vital as more of our records are digitized. People are starting to realize that passwords alone aren’t enough. Even with password protection, anything on your computer can potentially be viewed by an enterprising hacker. And…

Easy-to-exploit rooting flaw puts Linux computers at risk

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that’s already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS. The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. This means that many…

How To Become A Cybersecurity Entrepreneur In A Crowded Market

If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions. Declines in venture funding often paralyze the technology community. Talk of bubbles, dying unicorns, and austerity can surge for weeks following a negative report. In response, many entrepreneurs hit pause on their dreams, believing they should…

Critical cybersecurity priorities for the next US president

While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the United States. ISACA recommends that cyber security be a significant component of the next president’s 100-day agenda, especially given its overlap with geopolitical and economic issues. Bolstering the…

IKANOW 2.0 Delivers First Customizable Information Security Analytics Platform

Reston, VA — IKANOW today announced the first fully customizable information security analytics platform with enterprise scalability and multi-tenancy. There are many packaged solutions that claim big data analytics capabilities but simply don’t meet the scalability requirements of large enterprises nor do they allow for easy customization that companies need. Built on open sources technologies,…