Guest Post: Apple vs FBI: how dropped data encryption plans impact user privacy
From NordLocker: Expert’s insights on Apple’s dropped plan for full encryption January 24, 2020. About two years ago, Apple Read more.
Guest Post: Bringing DevSecOps into Play
By Shauli Rozen, CEO of Cyber Armor Continuous integration (CI), continuous delivery (CD) and agile development quickly delivering minimum viable Read more.
2020 predictions from Greg Wendt, Executive Director, Appsian
Greg Wendt, Executive Director, Appsian predicts: This year there will be a shift of CIO’s from systems technology experts to data-centric Read more.
From NordVPN: Make 2020 the most secure year ever: cybersecurity resolutions worth sticking to
NordVPN has issued the most important online security resolutions for the new year January 7, 2020. “New Year, New Read more.
From NordVPN: Governmental Institutions Around the World Fail to Protect Their Citizens’ Data
Why Aren’t Authorities Capable of Protecting Your Data? More and more governments around the world are discussing encryption backdoors to Read more.
Is AI a Magic Wand for Security?
By Ofer Elzam Artificial intelligence (AI) has connotations that it’s poised to do many magical things and improving enterprise Read more.
Guest Post: Don’t be the Phish: One Click Could Destroy Your Business
Email is now the weapon of choice for cyber criminals–and we’re all prize targets. Let’s face it, most of us Read more.
Guest Post: Learn Marriott’s Lesson: Before an M&A, Don’t Forget the “S” for Security
The business case for data security due diligence during mergers and acquisitions By Brian Vecci, Field CTO, Varonis The Marriott Read more.
Analyst Insight – US Blacklist of Chinese Surveillance Companies Creates Supply Chain Confusion
By Danielle vanZandt, Industry Analyst – Security, Aerospace, Defense, & Security, Frost & Sullivan The United States Department of Commerce’s Read more.
Guest Post: How hard is it to hack the US election?
From NordVPN: Digital privacy expert discusses how easy it is to hack into voting machines October 29, 2019. With Read more.
Introduction to Cyber Security
What is cyber security? This introduction to cyber security offers a brief overview of an immense, sprawling subject. Indeed, quite a few books have been written on this subject. It’s impossible to capture it all in a single web page. However, we thought it would be useful to provide a high-level introduction to this topic.
Cyber security is a field of endeavor that spans professions, technologies, processes, laws, law enforcement and national security. At its root, cyber security is about protecting digital assets from harm, theft or malicious, unauthorized use. A digital asset could be a database, a piece of technology like a computer or smartphone, a website, an e-commerce business and so forth.
An introduction to cyber security needs to reference its predecessor. The cyber security field is not new, though it used to be called by (and still is, to some extent) different names. It was known as “information security” (InfoSec). The legal side of it was known as “computer crimes.” The word “cyber” has come into nearly universal use today due to several major shifts that have occurred in the field.
Cyberspace, a concept popularized in science fiction, posits that we (the human users of technology) imagine the invisible, abstract “space” existing between us, our computers, and other computers and their users, as a physical place. It’s fake, but real. Got it? The cyber space has become real enough that it’s a very useful metaphor to describe criminal or malicious acts taking place between people and entities (e.g. governments, corporations) using computers.
We talk about cyber security because life in the modern world has become highly digital. As so many of our interactions and fundamental life processes rely on computers, then crime and malfeasance take place in cyberspace. Hackers are doing much more than affecting InfoSec. They’re affecting people’s lives, in some cases literally, through “cyber physical” acts like hacking connected cars and so forth.
Photo by Engin Akyurt from Pexels