http://www.securityweek.com/rethink-your-clouds-biggest-blind-spot
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Saturday, December 31, 2016
Rethink Your Cloud's Biggest Blind Spot | SecurityWeek.Com
http://www.securityweek.com/rethink-your-clouds-biggest-blind-spot
Thursday, December 29, 2016
Talking Doll Cayla Hacked To Spew Filthy Things (UPDATE) | The Huffington Post
http://m.huffpost.com/us/entry/6647046
Wednesday, December 28, 2016
Neanderthals in a boat? Not such a far-fetched notion after all
https://news.google.com/news/amp?caurl=https%3A%2F%2Fwww.thestar.com%2Famp%2Fnews%2Fworld%2F2016%2F12%2F27%2Fneanderthals-in-a-boat-not-such-a-far-fetched-notion-after-all.html#pt0-978147
Almost 8,000 Cyber Security Jobs Unfilled In Maricopa County | KJZZ
Because who wants to live...
http://kjzz.org/content/414127/almost-8000-cyber-security-jobs-unfilled-maricopa-county
Cyber security may face threats in days to come: ex-Nasscom chairman
500,000 gap?
https://news.google.com/news/amp?caurl=http%3A%2F%2Findianexpress.com%2Farticle%2Fcities%2Fhyderabad%2Fcyber-security-may-face-threats-in-days-to-come-ex-nasscom-chairman%2Flite%2F#pt0-857206
Tuesday, December 27, 2016
Bluewave - Wireless HiFi headphone amplifier | Indiegogo
https://www.indiegogo.com/projects/bluewave-wireless-hifi-headphone-amplifier-bluetooth-headphones#/?ref=FundedToday&utm_medium=referral&utm_source=51msa.fnd.to
Friday, December 23, 2016
How do synthesizers work? - Explain that Stuff
'via Blog this'
What Every Logic Pro User Ought To Know About Synthesizers
'via Blog this'
ElCapitan: App Nap
defaults write NSGlobalDomain NSAppSleepDisabled -bool YES"
'via Blog this'
Wednesday, December 21, 2016
Tuesday, December 20, 2016
Cyber firm says Russian 'Methbot' scam is defrauding digital advertisers
Cmon guys...
http://www.cnbc.com/2016/12/20/cyber-firm-says-russian-methbot-scam-is-defrauding-digital-advertisers.html?__source=google%7Ceditorspicks%7C&par=google&google_editors_picks=true
Colorado Health Department Grants Millions for Cannabis Research - The Weed Blog
$9 million over 5 years.
https://www.theweedblog.com/colorado-health-department-grants-millions-cannabis-research/?google_editors_picks=true
Former NSA Analyst Debunks Three Myths About Russian Hacking
https://news.google.com/news/amp?caurl=http%3A%2F%2Fobserver.com%2F2016%2F12%2Fformer-nsa-analyst-debunks-three-myths-about-russian-hacking%2Famp%2F#pt0-295219
Monday, December 19, 2016
Sunday, December 18, 2016
Bluewave - Wireless HiFi headphone amplifier | Indiegogo
https://www.indiegogo.com/projects/bluewave-wireless-hifi-headphone-amplifier-bluetooth-headphones#/?ref=FundedToday&utm_medium=referral&utm_source=51msa.fnd.to
Video of elusive ghost shark is both majestic and creepy
https://news.google.com/news/amp?caurl=http%3A%2F%2Fmashable.com%2F2016%2F12%2F18%2Fghost-shark-video.amp#pt0-349320
Saturday, December 17, 2016
Thursday, December 15, 2016
Wednesday, December 14, 2016
Donald Trump and the Tech Industry Disagree on America's Future - The Atlantic
DT lost 18 of 20 VC metros...
https://www.theatlantic.com/politics/archive/2016/12/trump-silicon-valley-tech/510584/?utm_source=twb
Tuesday, December 13, 2016
The Practical Global Corporate Data Approaches to the EU-US Privacy Shield
Monday, December 12, 2016
Sunday, December 11, 2016
Saturday, December 10, 2016
Vesper raises $15M to bring always-on microphones to the Internet of Things - SiliconANGLE
http://siliconangle.com/blog/2016/12/09/vesper-raises-15m-bring-always-microphones-internet-things/
These Toys Don’t Just Listen To Your Kid; They Send What They Hear To A Defense Contractor – Consumerist
https://consumerist.com/2016/12/06/these-toys-dont-just-listen-to-your-kid-they-send-what-they-hear-to-a-defense-contractor/?utm_source=twitter&utm_medium=socialflow
Friday, December 9, 2016
Thursday, December 8, 2016
Cybercrime-as-a-Service Economy: Stronger Than Ever
http://www.databreachtoday.com/cybercrime-as-a-service-economy-stronger-than-ever-a-9396
Wednesday, December 7, 2016
These Toys Don’t Just Listen To Your Kid; They Send What They Hear To A Defense Contractor – Consumerist
https://consumerist.com/2016/12/06/these-toys-dont-just-listen-to-your-kid-they-send-what-they-hear-to-a-defense-contractor/?utm_source=twitter&utm_medium=socialflow
Most cyber-criminals earn $US1K to US$3K a month, report - SC Magazine UK
http://www.scmagazineuk.com/most-cyber-criminals-earn-us1k-to-us3k-a-month-report/article/576069/
Tuesday, December 6, 2016
Cyberattacks are going to get a lot worse, former NSA official says | Healthcare IT News
http://m.healthcareitnews.com/news/cyberattacks-are-going-get-lot-worse-former-nsa-official-says
Monday, December 5, 2016
Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times
'via Blog this'
Sunday, December 4, 2016
The Future Of Insider Threats
For 2017 outlook pieces...
http://www.forbes.com/sites/realspin/2016/08/30/the-future-of-insider-threats/#37d29d286726
Half of IT Pros Say Insider Threats Are a Bigger Concern Than Hackers - Infosecurity Magazine
http://www.infosecurity-magazine.com/news/half-of-it-pros-say-insider/
More than 5,550 defense contractors have basic insider threat programs, DoD says - FederalNewsRadio.com
http://federalnewsradio.com/industryassociations/2016/12/5550-defense-contractors-basic-insider-threat-programs-dod-says/
Beware of these cyber hazards in 2017 | VentureBeat | Security | by Avi Chesla, empow
http://venturebeat.com/2016/12/03/beware-of-these-cyber-hazards-in-2017/
Saturday, December 3, 2016
Friday, December 2, 2016
After mothballing Comma One, George Hotz releases free autonomous car software | Ars Technica
'via Blog this'
Thursday, December 1, 2016
Americans don’t sleep enough, and it’s costing us $411 billion - The Washington Post
https://www.washingtonpost.com/posteverything/wp/2016/11/30/americans-dont-sleep-enough-and-its-costing-us-411-billion/?utm_term=.a1f657352f89
Tuesday, November 29, 2016
Masooda Bashir | ischool.illinois.edu
'via Blog this'
Monday, November 28, 2016
PropOrNot - Black Friday Report On Russian Propaganda Network Mapping.pdf - Google Drive
https://drive.google.com/file/d/0Byj_1ybuSGp_NmYtRF95VTJTeUk/view
Hatemi: Not by twins alone: Using the extended family... - Google Scholar
https://scholar.google.com/scholar?cites=10005905925752745289&as_sdt=2005&sciodt=0,5&hl=en
Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs
http://onlinelibrary.wiley.com/doi/10.1111/j.1540-5907.2010.00461.x/full
Continuous Monthly Calendar for Excel
'via Blog this'
Advanced Calendar Creator
'via Blog this'
Sunday, November 27, 2016
A Cyber Security Agency –A Suggestion to President-Elect Trump | A blog written by Dr. Stephen Bryen
http://www.bryensblog.com/cyber-security-agency-suggestion-president-elect-trump/
Pauline Oliveros, Creator of ‘Deep Listening,’ Dies at 84 | Billboard
http://www.billboard.com/articles/news/7588842/pauline-oliveros-experimental-composer-creator-deep-listening-dies-8a
Companies are in short supply of cyber security talent
https://www.geektime.com/2016/11/26/companies-are-in-short-supply-of-cyber-security-talent/
Friday, November 25, 2016
Twitter Best Practices: Why, When And How To Say "Thank You" To Your Followers
'via Blog this'
How to Extract a List of Followers from Twitter | Techwalla.com
https://www.techwalla.com/articles/how-to-extract-a-list-of-followers-from-twitter
Wednesday, November 23, 2016
Monday, November 21, 2016
64 Online Resources to Learn to Code for Free
'via Blog this'
A New, Evidence-based Estimate of Patient Harms Associated w... : Journal of Patient Safety
Cybersecurity risk versus errors...?
Saturday, November 19, 2016
About - Jason Savard
'via Blog this'
Forget The Gimmicks: Here’s the Best Way to Organize Your Gmail Inbox
'via Blog this'
Can Activist Turn Around Cyber Security - Pg.4 - TheStreet
https://www.thestreet.com/story/13899692/4/can-activist-turn-around-cyber-security.html
Amazon.com: Coms 4 Port Stereo Manual Selector Audio Sharing Switch Box: Home Audio & Theater
'via Blog this'
Friday, November 18, 2016
How can Lewis Hamilton win the Formula One title? Points permutations, TV times, race details, odds - Formula 1 - Eurosport
http://www.eurosport.com/formula-1/how-can-lewis-hamilton-win-the-formula-one-title-points-permutations-tv-times-race-details-odds_sto5953175/story.shtml
Thursday, November 17, 2016
Pinafore & Dungaree Dresses - Women's Clothing - Urban Outfitters
'via Blog this'
How to remove (disable / hide) the Virtual CD (VCD) for Windows or Mac OSX on a WD My Book or WD My Passport | WD Support
'via Blog this'
How to update the firmware on a My Book or My Passport | WD Support
'via Blog this'
The End of Obamacare — NEJM
Wednesday, November 16, 2016
Monday, November 14, 2016
Industry pros react to AdultFriendFinder data breach | ITProPortal
http://www.itproportal.com/news/industry-pros-react-to-adultfriendfinder-data-breach/
Sunday, November 13, 2016
Trump says cybersecurity maybe hardly doable
What Trump's victory means for cybersecurity - CSMonitor.com
"The security aspect of cyber is very, very tough. And maybe it's hardly doable."
Trump's First 100 Days: Restoring National Security Act
"Restoring National Security Act. Rebuilds our military by eliminating the defense sequester and expanding military investment; provides Veterans with the ability to receive public VA treatment or attend the private doctor of their choice; protects our vital infrastructure from cyber-attack; establishes new screening procedures for immigration to ensure those who are admitted to our country support our people and our values."
http://www.npr.org/2016/11/09/501451368/here-is-what-donald-trump-wants-to-do-in-his-first-100-days
Saturday, November 12, 2016
When the dam breaks Part 3 | Local News Stories | willistonherald.com
Friday, November 11, 2016
War Letters: Communication between Front and Home Front | International Encyclopedia of the First World War (WW1)
'via Blog this'
Study finds malware lurking in Amazon, Google and Groupon cloud services
https://www.scmagazine.com/600-plus-cloud-repositories-spotted-hosting-malware-and-malicious-files/article/572205/?utm_source=dlvr.it&utm_medium=twitter
XYZprinting da Vinci 1.0 AiO 3D Printer/Scanner | Staples®
'via Blog this'
Critical Infrastructure Sectors | Homeland Security
'via Blog this'
Thursday, November 10, 2016
ASUS Chromebook C301SA | Notebooks | ASUS USA
'via Blog this'
Donald Trump wins US Presidential election 2016: What does it mean for the tech sector?
the tech sector? - Computer Business Review
http://www.cbronline.com/news/verticals/central-government/donald-trump-wins-us-presidential-election-2016-mean-tech-sector/
Cyber Security for Critical Infrastructure Protection - SCADAhacker
'via Blog this'
Donald Trump wins US Presidential election 2016: What does it mean for the tech sector? - Computer Business Review
the tech sector? - Computer Business Review
http://www.cbronline.com/news/verticals/central-government/donald-trump-wins-us-presidential-election-2016-mean-tech-sector/
Wednesday, November 9, 2016
Library of Resources for Industrial Control System Cyber Security
Industrial Control System Cyber Security:
https://scadahacker.com/library/index.html
University of Utah researcher: Trump University lawsuits lay groundwork for potential impeachment of Donald Trump | UNews
groundwork for potential impeachment of Donald Trump
http://unews.utah.edu/university-of-utah-researcher-trump-university-lawsuits-lay-groundwork-for-potential-impeachment-of-donald-trump/
IoT security window closing
Monday, November 7, 2016
How Easy Is It To Hack A Self-Driving Car? - Vocativ
Cybersecurity Is A Global Threat To Democracy Yet Not Well Understood
http://www.forbes.com/sites/forbestechcouncil/2016/11/07/cybersecurity-is-a-global-threat-to-democracy-yet-not-well-understood/#7c0a3a7f2821
Saturday, November 5, 2016
Will hackers disrupt Tuesday's election? - The San Diego Union-Tribune
'via Blog this'
New cyber security strategy changes relationship between government and IT suppliers
and IT suppliers
http://www.computerweekly.com/opinion/New-cyber-security-strategy-changes-relationship-between-government-and-IT-suppliers
Friday, November 4, 2016
Cybersecurity Legislation | Cybercrime Laws | Cyber Security News - ISACA
Thursday, November 3, 2016
Wednesday, November 2, 2016
City ISP makes broadband free because state law prohibits selling access | Ars Technica
access | Ars Technica
http://arstechnica.com/information-technology/2016/10/city-isp-makes-broadband-free-because-state-law-prohibits-selling-access/
How does the Federal Privacy Council affect government security?
http://searchsecurity.techtarget.com/answer/How-does-the-Federal-Privacy-Council-affect-government-security
Tuesday, November 1, 2016
Sunday, October 30, 2016
Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch
"The government recently finalized a sweeping amendment to the Federal
Acquisition Regulation (“FAR”) that will impose basic information system
safeguarding requirements on many federal acquisitions, marking the
latest in the continuing government effort to regulate and enhance
cybersecurity protections in the industry. The Final Rule, effective
June 15, 2016, imposes fifteen basic safeguarding requirements for
contractors with information systems containing information provided by,
or generated for, the government under a federal contract."
Saturday, October 29, 2016
Opinion: Don't drop fitness standards for military hackers - CSMonitor.com
Bull...
http://www.csmonitor.com/World/Passcode/Security-culture/2016/1028/Opinion-Don-t-drop-fitness-standards-for-military-hackers
Friday, October 28, 2016
Thursday, October 27, 2016
Experts: Cyber insurance market full of ‘trap doors’
https://www.cyberscoop.com/experts-cyber-insurance-market-full-trap-doors/
Wednesday, October 26, 2016
BeagleBone Green – Seeed │DigiKey
We Left the Internet Vulnerable to Hackers. Now We’re Paying the Price.
http://www.slate.com/articles/news_and_politics/war_stories/2016/10/the_dyn_ddos_attack_shows_how_vulnerable_we_ve_made_ourselves.html
Tuesday, October 25, 2016
Converting Email from Eudora: Why I No Longer Live at the P.O.
'via Blog this'
Emailchemy 13.2.1 Released – Weird Kid Software
'via Blog this'
culture.it.newsscan - NewsScan Daily, 30 May 2003 ("Above The Fold") - msg#00021 - Recent Discussion OSDir.com
Monday, October 24, 2016
GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact
On freedom of the press, Donald Trump wants to make America like England again - The Washington Post
Until recently, English law was so tough on the media that disgruntled subjects of news reports could use the country's court system to carry out what the New York legislature called “libel terrorism.”
'via Blog this'
Data Breach and Due Diligence: Why Boards Need to Get Involved with Cyber Insurance | ID Experts
Cyber Insurance
https://www2.idexpertscorp.com/blog/single/data-breach-due-diligence-why-boards-need-to-get-involved-cyber-insurance
Game changer: California investigating Wells Fargo for identity theft | 2016-10-19 | HousingWire
http://www.housingwire.com/blogs/1-rewired/post/38325-game-changer-california-investigating-wells-fargo-for-identity-theft
Sunday, October 23, 2016
Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities
http://www.aid4mail.com/email-migration
"application will convert on the PC my Emails to MBOX files that can be then copied to the MAC and imported into Apple's mail. "
'via Blog this'
Friday, October 21, 2016
Open-source hack-proof router aims to close cyber security gap | E&T Magazine
https://eandt.theiet.org/content/articles/2016/10/open-source-hack-proof-router-aims-to-close-cyber-security-gap/
Scientists are unlocking the mystery of how marijuana makes us get high
https://news.google.com/news/amp?caurl=http%3A%2F%2Fwww.theverge.com%2Fplatform%2Famp%2F2016%2F10%2F20%2F13344326%2Fmarijuana-structure-how-it-works-thc-cb1-k2-spice-study#pt0-956501
Thursday, October 20, 2016
Game changer: California investigating Wells Fargo for identity theft | 2016-10-19 | HousingWire
| 2016-10-19 | HousingWire
http://www.housingwire.com/blogs/1-rewired/post/38325-game-changer-california-investigating-wells-fargo-for-identity-theft
Elon Musk: negative media coverage of autonomous vehicles could be 'killing people'
Autonomous vehicles...
Startup key combinations for Mac - Apple Support
Wednesday, October 19, 2016
Joshua Aaron, suspected of largest bank hack ever, arrested in Russia: Report - Washington Times
JPMorgan Chase case...
http://m.washingtontimes.com/news/2016/oct/11/joshua-aaron-suspected-largest-bank-hack-ever-arre/
Tuesday, October 18, 2016
Monday, October 17, 2016
Donald Trump's ridiculous claims about voter fraud are an embarrassment
https://news.google.com/news/amp?caurl=https%3A%2F%2Fwww.washingtonpost.com%2Famphtml%2Fnews%2Fthe-fix%2Fwp%2F2016%2F10%2F17%2Fdonald-trumps-ridiculous-claims-about-voter-fraud-are-an-embarrassment%2F#pt0-791466
Donald Trump loses it, calls for “revolution” - Salon.com
""We should have a revolution in this country." That was the opinion of Donald Trump after President Obama won re-election..."
http://www.salon.com/2012/11/07/donald_trump_loses_it_calls_for_revolution/
Trump calls for revolution, blasts Electoral College | TheHill
"The real estate mogul and host of reality show "The Apprentice" has been an outspoken supporter of Mitt Romney. He used Twitter to object vehemently to the Electoral College system that he predicted would give the win to Obama and the popular vote to the GOP challenger."
Hackers, Organizational Doxing, and Data Forgeries - The Atlantic
Sunday, October 16, 2016
Saturday, October 15, 2016
Trump’s supporters talk rebellion, assassination at his rallies - The Boston Globe
Boston Globe
Note voting stat of 1.5%...
https://www.bostonglobe.com/news/politics/2016/10/15/donald-trump-warnings-conspiracy-rig-election-are-stoking-anger-among-his-followers/LcCY6e0QOcfH8VdeK9UdsM/story.html
How Cannabis Can Help You Manage Your Arthritis - The Weed Blog
https://www.theweedblog.com/cannabis-can-help-manage-arthritis/?google_editors_picks=true
Trump calls for U.S. to use offensive cyberweapons | PCWorld
http://www.pcworld.com/article/3126578/security/trump-calls-for-us-to-use-offensive-cyberweapons.html
Friday, October 14, 2016
Antivirus Makers Work on Software to Catch Malware More Effectively - The New York Times
30 days before hacking story broke, blaming Symantec...
Thursday, October 13, 2016
Cyber Liability Expert Kimberly Holmes Joins ID Experts
https://www2.idexpertscorp.com/blog/single/cyber-liability-expert-kimberly-holmes-joins-id-experts
Survey: Growing Interest in Cyber Security Careers Among Millennials -- Campus Technology
-- Campus Technology
https://campustechnology.com/articles/2016/10/12/survey-growing-interest-in-cyber-security-careers-among-millennials.aspx?m=1
Watch The New Yorker Festival | Sam Esmail on Computer Hacking and Loneliness
Loneliness | The New Yorker Video
http://video.newyorker.com/watch/the-new-yorker-festival-sam-esmail-on-computer-hacking-and-loneliness?c=series
Wednesday, October 12, 2016
6 Cyber Security Strategies To Protect Your Small Business
Tuesday, October 11, 2016
EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses
6 Ways To Prepare For The EU's GDPR
GDPR: Who does the EU GDPR Apply To? | Varonis Systems
New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR)
Internet Speed Test - HTML5 Speed Test
Monday, October 10, 2016
EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA
Under Article 37, the GDPR tasks the Data Protection Officer (DPO) with “awareness raising and training of staff involved in the processing operations.”
Under Article 43, in connection with Binding Corporate Rules(BCRs), the GDPR requires “the appropriate data protection training to personnel having permanent or regular access to personal data.”
EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology
The Privacy Shield will operate in parallel with other existing data transfer mechanisms including Standard Contractual Clauses ("SCCs") and Binding Corporate Rules ("BCRs").
The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options | Bloomberg BNA
Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com
20/20 Software EU-US PRIVACY SHIELD PRIVACY POLICY
What is BBB EU Privacy Shield?
EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That
Jones Day | The EU–U.S. Privacy Shield Approved
Privacy Shield's Drama Is Far From Over
Harbor Pilots Called to Steer Larger Ships - WSJ
So, data or docks, containers secured. Physical or digital?
http://www.wsj.com/articles/harbor-pilots-called-to-steer-larger-ships-1451072906
Sunday, October 9, 2016
Saturday, October 8, 2016
Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com
http://www.securityweek.com/google-signs-euus-privacy-shield
Wednesday, October 5, 2016
Monday, October 3, 2016
What's driving boards of directors to make cyber security a top priority? - Help Net Security
priority? - Help Net Security
https://www.helpnetsecurity.com/2016/09/29/make-cyber-security-priority/
Sunday, October 2, 2016
How Hostile Poll-Watchers Could Hand Pennsylvania to Trump - POLITICO Magazine
http://www.politico.com/magazine/story/2016/09/2016-election-pennsylvania-polls-voters-trump-clinton-214297
Saturday, October 1, 2016
DEA’s Army of 18,000 Informants Pocketed $237 Million Over Five Years
"33 DEA sources working at Amtrak, including train attendants and ticket agents, who collectively were paid more than $1.4 million over four years"
Wednesday, September 28, 2016
Statistician – Powerful, Easy to Use Statistics Add-In for Excel
'via Blog this'
Why are these clowns winning? Secrets of the right-wing brain - Salon.com
http://www.salon.com/2014/11/29/why_are_these_clowns_winning_secrets_of_the_right_wing_brain/
Tuesday, September 27, 2016
Transcript: Here are words Trump just used to talk about 'the cyber' - The Verge
'via Blog this'
Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive
Sunday, September 25, 2016
Tracing the hidden River Sherbourne under Coventry - BBC News
Tuesday, September 20, 2016
Marshmallow for Dell Venue 8 7840? - Android Mobile Products - Mobile Devices - Dell Community
"Nop, no, niet, nada. Not going to happen. Dell ditched the device 4 weeks ago (NO more support, NO more update, nothing!) and hence have given prove once again that you must never ever buy anything this company releases. I made that mistake twice now, I´m healed."
http://en.community.dell.com/support-forums/mobile-devices/f/4585/t/19664451?pi41117=2
Stop victim shaming in cyber attacks | TheHill
Monday, September 19, 2016
John Turner (1838-1895) | WikiTree: The FREE Family Tree
About the right timing to be father of William Horace Turner
'via Blog this'
Sunday, September 18, 2016
A Loud Sound Just Shut Down a Bank’s Data Center for 10 Hours | UP2V
Saturday, September 17, 2016
Thursday, September 15, 2016
Cyberwar is here! Offense, defense and 'special teams' | CSO Online
What about fighting cybercrime?
http://www.csoonline.com/article/3116151/leadership-management/cyberwar-is-here-offense-defense-and-special-teams.html?google_editors_picks=true
This employee badge knows not only where you are, who you are talking to - Chicago Tribune
to - Chicago Tribune
http://www.chicagotribune.com/bluesky/technology/ct-humanyze-employee-badge-20160907-story.html
Sunday, September 11, 2016
Formula 1 2016 TV schedule: Channel 4 and Sky Sports live races and season calendar
season calendar
http://www.radiotimes.com/news/2016-03-15/formula-1-2016-race-calendar-and-tv-schedule
Thursday, September 8, 2016
What was Silicon Valley like after the bubble burst in the early 2000s? - Quora
ESET Knowledgebase
ESET
Knowledgebase or run it
directly from Eset.com.
Wednesday, September 7, 2016
Fear and hacking on the campaign trail: Will the vote be secure? | The Sacramento Bee
Sacramento Bee
http://www.sacbee.com/news/politics-government/election/presidential-election/article99641427.html?utm_content=bufferee8ea&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer#emlnl=Morning_Newsletter
New leaked files reveal more about NSA satellite eavesdropping
New leaked files reveal more about NSA satellite eavesdropping
http://www.theverge.com/2016/9/6/12813736/menwith-hill-gchq-nsa-satellite-wireless-surveillance-leaks
Saturday, September 3, 2016
New research finds that college degrees are less valuable for Americans raised poor — Quartz
In fact, the earnings gap between those from wealthy and poor families widens throughout one's career
http://qz.com/632203/for-one-subset-of-society-a-college-degree-is-worth-far-less/
Thursday, September 1, 2016
2016 Report | One Hundred Year Study on Artificial Intelligence (AI100)
Check for hacking?
https://ai100.stanford.edu/2016-report
Wednesday, August 31, 2016
Why you need a CSO/CISO | CIO
Why a CSO/CISO?
Tuesday, August 30, 2016
Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say
Ultimate Guide to Harvard Referencing - Cite This For Me
Monday, August 29, 2016
These countries are facing the greatest skills shortages | World Economic Forum
Articles by Steve Morgan | CSO Online
Friday, August 26, 2016
How do I report independent samples T-test data in APA style?
Why distributed networks and smart sensors won’t survive in self-driving cars | Computerworld
self-driving cars | Computerworld
http://www.computerworld.com/article/3112729/car-tech/why-distributed-networks-and-smart-sensors-wont-survive-in-self-driving-cars.html?google_editors_picks=true
Thursday, August 25, 2016
Half of High School Seniors Lack Access to Computer Science -- THE Journal
Ashley Madison Blasted Over Fake Security Award
If a company’s main product is discreet sexual services, it should probably lock down its customer data good and tight.
Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com
In November of 2015, federal CIO Tony Scott said he was "attempting to fill more than 10,000 estimated openings for cyber professionals in the federal government"
Reporter's Notebook: Testing Out the World's First Self-Driving Taxi
https://news.google.com/news/ampviewer?caurl=http%3A%2F%2Fwww.wsj.com%2Famp%2Farticles%2Freporters-notebook-testing-out-the-worlds-first-self-driving-taxi-1472125855#pt0-44718
The biggest threat facing connected autonomous vehicles is cybersecurity | TechCrunch
cybersecurity | TechCrunch
https://techcrunch.com/2016/08/25/the-biggest-threat-facing-connected-autonomous-vehicles-is-cybersecurity/
How We Can Identify Promising Candidates for Open IT Security Positions
http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/how-we-can-identify-promising-candidates-for-open-it-security-positions/?utm_medium=twitter&utm_source=twitterfeed
Apple could be on the hook for $19 billion in taxes, and the Obama administration is livid
administration is livid
https://news.google.com/news/ampviewer?caurl=https%3A%2F%2Famp.businessinsider.com%2Fapple-taxes-us-treasury-european-commission-2016-8#pt0-992520
Wednesday, August 24, 2016
New computer science course’s challenge is finding qualified teachers to teach it | EdSource
Manpower says businesses face 'crippling talent shortage’ across the world
Monday, 18 May 2015 | 11:00 AM ET|00:34
More than one-third of employers around the world are experiencing difficulty filling job positions, global employment consultancy Manpower reported on Monday.
Cybersecurity job market to suffer severe workforce shortage | CSO Online
Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine
Rockwell Automation addresses global skills shortage
• Improving machinery design to address ergonomics and safety risks for a more diverse workforce, including older and younger workers.
• Building a Connected Enterprise to improve productivity and efficiency through information-enabled operations.
• Training workers to preserve and pass on the knowledge of experienced workers, and to equip workers with the skills needed to take advantage of new technologies.
• Leveraging vendors and suppliers to augment core competencies when specialised skills are only occasionally required or when local talent is not available.
• Engaging the community to improve the skills and availability of young workers.
Only 1 in 60 students have access to digital learning opportunities outside of the classroom
Half of High School Seniors Lack Access to Computer Science -- THE Journal
New Data: Bridging the Computer Science Access Gap | Change the Equation
Secrecy News 07/17/01
Snowden’s New Lies for Old | The XX Committee
So you want to know about NSA … | The XX Committee
Half of High School Seniors Lack Access to Computer Science -- THE Journal
The Real Russian Mole Inside NSA | | Observer
http://observer.com/2016/08/the-real-russian-mole-inside-nsa/
Tuesday, August 23, 2016
Hacking a WordPress Botnet - Wordfence
'via Blog this'
How do I interpret data in SPSS for an independent samples T-test?
"
'via Blog this'
Monday, August 22, 2016
Sunday, August 21, 2016
NICE strategic plan lays path for training cyber workforce
Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes
IEEE Quote on cybersecurity path - Platt
“This confusion causes the profession to grow less efficiently than it could,” says IEEE Senior Member Greg Shannon, chief scientist for the CERT Division at Carnegie Mellon University Software Engineering Institute, in Pittsburgh, and chair of the IEEE Cybersecurity Initiative. “People can’t say, ‘These are the credentials I need’ and ‘This is how much it is going to cost me to get them.’”
Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post
Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com
Cyber security sector struggles to fill skills gap - FT.com
The Most Serious Skill Gap Of All - Forbes
Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now
'via Blog this'
Saturday, August 20, 2016
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information | RAND
Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com
http://www.securityweek.com/report-shows-few-solutions-filling-cyber-skills-gap
"Our experience shows that the lack of security managers is more severe and impactful than the lack of technology experts. Growing technical skills is important, but seeing a bigger picture of all threats or those relevant to a particular business is paramount." _ Kaspersky
Friday, August 19, 2016
Thursday, August 18, 2016
How Donald Trump could make America great again - Al Jazeera English
http://www.aljazeera.com/indepth/opinion/2016/08/donald-trump-america-great-160816095348041.html
Wednesday, August 17, 2016
Reimagining the Cybersecurity Profession | US News
'via Blog this'