A Looming Cybersecurity Crisis and Why Opportunity Youth are the Solution (Forbes)

Cyberattacks on U.S. critical infrastructure and the theft of millions of records containing personally identifiable information have indicated that there are serious vulnerabiliti... More

Piracy Survey: 39% of U.S. Consumers Don’t Care That Studios Lose Money From Illegal Sharing (Variety)

Most people know that content piracy is illegal — but a significant number of consumers say the fact that Hollywood studios lose money because of pirated movies and TV shows h... More

Boards of Directors, Managers at Center of Cybersecurity Handbook for Industry (Federal News Radio)

The server room might be an obvious choice for a starting point when it comes to protecting your company’s cyber networks, but the National Association of Corporate Directors say... More

The CIO Must Take Charge of the Organization’s Application Portfolio (Security Intelligence)

here was a time when every application used in the enterprise application portfolio was either selected and deployed by the chief information officer (CIO) or at least vetted und... More

5 Great ‘Starter’ Cybersecurity Certifications (Business News Daily

Looking for a career change in the new year? There's no better time to consider a career in cybersecurity: U.S. businesses and government agencies are spending billions of dollars ... More

Report: Potential $5M in Ad Fraud Daily from ‘Methbot’ (Krebs on Security)

New research suggests that an elaborate cybercrime ring is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising ... More

IT Managers: Employees Consistently Flout Security Policies (Info Security)

Despite investment in cyber security, employees are still putting organisations at risk, according to new research from Databarracks. A new study reveals that nearly two thirds ... More

IBM’s Watson to Tackle Cybercrime

IBM Security has announced Watson for Cyber Security, a new cloud-based version of the company's cognitive technology trained on the language of security as part of a year-long re... More

Information Security Culture: It’s Time to Upgrade to 2.0 (Info Security)

Information security requires an approach that involves people, process and technology. But, while we have made great strides in technological advancements in information security,... More

iOS Forensics Expert’s Theory: FBI Will Hack Shooter’s Phone by Mirroring Storage (ARS Technica)

Jonathan Zdziarski, a leading independent Apple iOS security researcher and forensics expert, has a theory about the FBI's newly discovered potential route into the iPhone 5C use... More

Capgemini: Learning Digital Skills ‘First Hurdle’ for Young People (IT Pro)

Society's 'outliers' must learn basic digital skills, says Capgemini, in order for underprivileged youth forgotten by traditional education to find their place in today's tech-driv... More

CDSA Announces New Appointments (CDSA)

Chris Johnson Named Worldwide Director of Anti-Piracy and Compliance Programs LOS ANGELES —  In order to provide expanded services to its customers and to address increasingly ... More

Quantum Computing Breakthrough Renews Concerns of Cybersecurity Apocalypse (Network World)

The term "cryptopocalypse" was probably first coined at the Black Hat USA information security convention in 2013. A talk presented by four security and technology experts at the... More

Data’s Role in Music and Marketing (ClickZ)

Music services like Pandora, Spotify, and Shazam can be a goldmine of information for brands interested in targeting segmented audiences for advertising. These platforms have milli... More