Home neo urban 1808082 960 720 324x235

DHS CISA Warns That Iranian Hackers Increasingly Using Destructive ‘Wiper’ Attacks

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs on Saturday released a statement in response to the recent rise in malicious cyber activity, including spear phishing and brute force attacks,...

LATEST NEWS

Legislators Introduce Bill to Force Social Media Firms to Disclose How Much They Make From User Data

Sens. Mark R. Warner (D-VA) and Josh Hawley (R-MO) on Monday introduced the Designing Accounting Safeguards to Help Broaden Oversight And Regulations on Data...

Hackers Target Mobile Phone Networks in Sophisticated Cyber Espionage Attack

Hackers compromised companies in more than 30 countries with the aim of gathering information on individuals in government, law-enforcement and politics, according to a...

Google to Purchase Analytics Firm Looker for $2.6 Billion

Google LLC today announced Thursday that it has entered into an agreement to acquire Looker, a privately held big-data analytics company, for $2.6 billion...

NSA Releases Advisory on BlueKeep Vulnerability

The National Security Agency (NSA) has released a cybersecurity advisory for CVE-2019-0708—a vulnerability dubbed BlueKeep. Although Microsoft has issued a patch, potentially millions of...

BMW, Jaguar Collaborate on Electric Car Technology

The BMW Group and Jaguar Land Rover on Monday stated they are joining forces to jointly develop electric motors, transmissions and power electronics, an...

Oracle, Microsoft Partner to Deliver Cloud Services

Microsoft Corp. and Oracle Corp. on Wednesday announced a cloud interoperability partnership enabling customers to migrate and run mission-critical enterprise workloads across Microsoft...

FEATURED

POPULAR

EVENTS

JOBS

VENDOR WATCH

Home JonB Headshot 1 324x235

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru  Home John Ackerly 324x235

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of...

Legislators Introduce Bill to Force Social Media Firms to Disclose How Much They Make From User Data

Sens. Mark R. Warner (D-VA) and Josh Hawley (R-MO) on Monday introduced the Designing Accounting Safeguards to Help Broaden Oversight And Regulations on Data...

NEWS

Senate Passes Bill to Block ‘Trolls’ Who Meddle With US Elections From Entering The Country

The U.S. Senate on Monday unanimously passed bipartisan legislation to prevent individuals who interfere with U.S. elections from entering the United States. The Defending Elections...

11.9 Million Patients Affected by Quest Diagnostics Breach

Medical testing company Quest Diagnostics revealed on Monday that a third-party billing company has been hit by a data breach affecting 11.9 million patients....

Lawmakers Introduce Cyber Ready Workforce Act to Boost Cybersecurity Workforce

Lawmakers in the House and Senate introduced legislation on Wednesday to address the shortage in the cybersecurity workforce. The Cyber Ready Workforce Act would...

Trump Issues Executive Order to Address Foreign Espionage to US Networks

President Donald Trump on Wednesday issued an executive order declaring a national emergency to deal with outside threat to US networks – a measure...

HSCC Releases Medical Device and Health IT Joint Cybersecurity Plan

The Healthcare and Public Health Sector Coordinating Council (HSCC) on Wednesday released new recommendations for manufacturing and managing the security of medical devices for...

DOE Awards $40 Million in Funding for Grid Modernization Initiative

The Department of Energy (DOE) last week announced $40M in FY19 funding for the Grid Modernization Initiative (GMI). The GMI, a crosscutting initiative...

INTERVIEWS

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...

We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO

Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing...