The much publicized hacking of Anthem, Sony and Target (the biggest retail hack in U.S. history) has demonstrated that no matter how robust your perimeter security, cyber criminals will gain—or already have gained—access to your network. This is because when protecting against cyber attacks, many companies focus exclusively on endpoint protection and breach prevention. But … continue reading
Verizon is releasing its 2015 Data Breach Investigations Report, which revealed that while cyber threats are getting more sophisticated, many cyber attacks still rely on decades-old techniques. According to the report, 70% of attacks involve a secondary victim, which adds complexity to a breach. Another key finding revealed that users fail to implement security patches, … continue reading
Code.org announced its Hour of Code campaign has eclipsed 100 million hours, measured by the time students have spent taking the free programming courses and tutorials offered online. The total dates back to the program’s beginning back in June 2013. The organization also announced the number of lines of code written has surpassed 5 billion … continue reading