China said it will create at least four cybersecurity schools over the next decade as it looks to educate more cybersecurity experts.
Reactions after a data breach are similar to the five stages of grief, which highlight the importance of showing empathy, writes Daniel Schwalbe. The blame is often put on cybersecurity professionals, who may be doing everything they can to prevent attacks, Schwalbe notes.
Blockchain's ability to protect a database has attracted the attention of the Pentagon, which has been working with NATO allies to develop apps for the military using the technology. Blockchain could be used to expedite processes, per a note from the Defense Advanced Research Projects Agency.
The security risks posed by the internet of things present opportunities and vulnerabilities for solutions providers, panelists said during The Channel Co.'s 2017 conference in Orlando, Fla. If they focus on offering data interpretation, solutions providers could help business customers adopt IoT and build out their IoT practices, panelists said.
Many companies have had difficulties with cybersecurity because they have under-resourced the problem and aren't sure how to handle it properly, says Centurylink Chief Security Officer Dave Mahon. Companies must map IT assets against corporate strategies, including business objectives, as a first step to protecting against cyberthreats, Mahon says.
Global spending on IT security products and services will increase by 7% this year, Gartner predicts, and continue to grow through 2021. This growth will be fueled by security services, app security testing and protection against data breaches, Gartner predicts.
Everyone has a role to play when it comes to cybersecurity, write Ger Daly and Kevin O'Brien. Employers should be training employees and "should conduct regular checks to assess both employee adoption of and adherence to data security guidelines and policies," they write.
Uber has settled with the Federal Trade Commission over accusations that the company failed to protect customer data, resulting in a breach in 2014. Uber will hire a third-party firm to conduct privacy monitoring.
- Page 1