-
January 27th, 2014Category:Read More »
For about half of all Americans, your stove may be teaching you something invaluable about data privacy. Or perhaps it’s your heating system or outdoor grill.
For roughly 70 million households, the use of natural gas isn’t just a way to keep warm or a tool to learn that cleaning S’mores from fireplaces is a task fit only to produce great clouds of profanity; it’s a lesson that data privacy begins with data awareness and a holistic review of your enterprise.
-
January 9th, 2014Category:Read More »
Every new year, individuals resolve to improve themselves somehow, by, say, vowing to lose weight, watch less TV, save money, or, most commonly, read more cyber security blogs. For individuals and our host of foibles, there are dozens of beneficial ways to accomplish self-betterment, most equally vital.
-
December 10th, 2013Category:Read More »
This is part II of a two-part series on getting a job in cyber security. Click here for part I, cyber security career paths.
Dos and Don'ts of Getting Your Cyber Security Resume Viewed
-
By December 3rd, 2013Category:Read More »
This is part I of a two-part series on finding a job in cyber security. Click here for Part II.
Many Roads Lead to Cyber Security
-
November 26th, 2013Category:Read More »
In the final days of November, the nation's focus rightly turns to the fondest and finest things in life -- family, friends, turkey and artfully composed invective hurled toward football officials. Yes, Thanksgiving is upon us.
So as we celebrate one of the nation's most cherished traditions -- that is, unless you're a turkey -- let's give thanks to the cyber world, for helping allow us to connect with loved ones, relatives, and, of course, Amazon.com.
- November 26th, 2013Category:Read More »
In the final days of November, the nation's focus rightly turns to the fondest and finest things in life -- family, friends, turkey and artfully composed invective hurled toward football officials. Yes, Thanksgiving is upon us.
So as we celebrate one of the nation's most cherished traditions -- that is, unless you're a turkey -- let's give thanks to the cyber world, for helping allow us to connect with loved ones, relatives, and, of course, Amazon.com.
-
November 14th, 2013Category:Read More »
In August, Adobe suffered an extensive breach of customer data and its source code, an attack first reported by Brian Krebs in October.
More than 38 million customer accounts were effected, along with 40GB of source code taken. And no, not even the company that brings you Photoshop could make the breach look like anything short of a serious problem.
-
November 10th, 2013Category:Read More »
NJVC is proud to announce Lynn DeCourcey, vice president and general manager, cyber security, is a bronze Stevie Award winner for the second time this year.
DeCourcey was named a Bronze winner as Executive of the Year, Business Services, 11 to 2,500 Employees, in the 10th annual Stevie Awards for Women in Business, in a ceremony held Friday night in New York. The Stevie Awards for Women in Business honor women executives, entrepreneurs, employees and the companies they run.
-
November 5th, 2013Category:Read More »
The end of October is always a spooky time, unleashing the frightening (witches, werewolves and monsters of all varieties), the undead (ghosts, zombies, mummies) and the frighteningly undead (e.g., the ghoulish concoction that is circus peanuts) on neighborhoods across the country.
But nowhere may it be scarier than enterprise IT departments, as the end of October marks the end to National Cyber Security Awareness Month (NCSAM).
-
November 1st, 2013Category:Read More »
It started with a worm, a graduate student, a little curiosity and an enormous lesson in the law of unintended consequences.
Pages
