Some U.S. Department of Homeland Security employees in the Washington area and Philadelphia were unable to access some agency computer networks on Tuesday, according to three sources familiar with the matter.
Interested in a career in homeland security? You might be surprised at how many different types of jobs the department employs! But you need the right education to get there.
Interested in working for Homeland Security, but also want to travel? While we might think of DHS as operating on US soil only, there are opportunities internationally as well!
If you own or manage a small business, you’re undoubtedly concerned about how to keep your customers’ personal and your business’ proprietary and financial
You've got the password basics down. It's time for some advanced techniques.
From locking your smartphone with a pin to installing a security app, these common-sense tips will help keep you and your information protected.
We often talk about designing security into a product from the get go, but we don’t often discuss what that means. In today’s podcast John ...
I have worked in finance roles in the tech industry for much of my career, but since joining Threat Stack, I’ve had my eyes opened wide to the world of security. I have learned just how vital an effective security strategy is to the health of any modern business – and as a corollary, how [...]
The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.
The dangerous vulnerability in Internet Explorer can be mitigated by using a different browser, disabling Flash or adjusting settings in your browser.
Current state of industrial automation system security plus the technological and organizational challenges of improving it.
It's the most wonderful time of the year—for burglars, that is. With a large portion of the neighborhood out on holiday vacation, empty houses can look particularly inviting to thieves. But don't fret: We've got the scoop on how to make yours less of a target.
To become more secure, focus your training and manage your top risks.
There are three types of rogue employees: The Innovative, The Bad and The Lazy. Here's how you can identify and stop them in their tracks.
The National Geospatial-Intelligence Agency will be locking employees in escape rooms to test their knowledge of cybersecurity.
Want to bring your home security into the 21st century? Colour-changing lights, thermostat systems controlled by your phone and smart locks, the home of the future is available right now. Find out about smart locks, how they work and whether they are worth investing in.
More than 90 percent of employees violate policies designed to prevent data breaches.
As more people are converting to smart technology for basic needs, more problems with the technology are being found.
Don’t leave your family vulnerable to the risk of data loss and identity theft, but keep your home computer safe. The danger is very real and growing.
When it comes to network and cyber security, what are the real differences? Find out everything you need to know here.
As enterprise networks evolve, the need for a secure WAN increases. In the past, sensitive data storage and processing was primarily performed on an organization’s internal network. As a result, it…