What resources do small utilities need to defend against cyberattacks?

In the country’s mission to protect critical infrastructure, more can be done to defend small community water, electricity and gas providers against cyber threats.

The post What resources do small utilities need to defend against cyberattacks? appeared first on CyberScoop.

Continue reading What resources do small utilities need to defend against cyberattacks?

How Congress can make the most of Schumer’s AI Insight Forums

Senate Majority Leader Chuck Schumer’s landmark effort to develop AI policy needs to get the right people in the room to be successful.

The post How Congress can make the most of Schumer’s AI Insight Forums appeared first on CyberScoop.

Continue reading How Congress can make the most of Schumer’s AI Insight Forums

What do you really need for a career in cybersecurity? It’s probably not what you think.

You don’t need to be a programmer, developer, hacker, technocrat, legal expert or even have a college degree to get a job in cybersecurity.

The post What do you really need for a career in cybersecurity? It’s probably not what you think. appeared first on CyberScoop.

Continue reading What do you really need for a career in cybersecurity? It’s probably not what you think.

Three key unanswered questions about the Chinese breach of Microsoft cloud services

Repeated breaches of cloud computing services makes understanding a recent incident affecting Microsoft essential.

The post Three key unanswered questions about the Chinese breach of Microsoft cloud services appeared first on CyberScoop.

Continue reading Three key unanswered questions about the Chinese breach of Microsoft cloud services

Three key unanswered questions about the Chinese breach of Microsoft cloud services

Repeated breaches of cloud computing services makes understanding a recent incident affecting Microsoft essential.

The post Three key unanswered questions about the Chinese breach of Microsoft cloud services appeared first on CyberScoop.

Continue reading Three key unanswered questions about the Chinese breach of Microsoft cloud services

Three key unanswered questions about the Chinese breach of Microsoft cloud services

Repeated breaches of cloud computing services makes understanding a recent incident affecting Microsoft essential.

The post Three key unanswered questions about the Chinese breach of Microsoft cloud services appeared first on CyberScoop.

Continue reading Three key unanswered questions about the Chinese breach of Microsoft cloud services

Violent extremism is still spreading online. There’s a way to stop it.

Fighting online terrorist and violent extremist content involves machine learning but also an acceptance that the process won’t be perfect.

The post Violent extremism is still spreading online. There’s a way to stop it. appeared first on CyberScoop.

Continue reading Violent extremism is still spreading online. There’s a way to stop it.