work  Home work 324x235

Lawmakers Introduce Cyber Ready Workforce Act to Boost Cybersecurity Workforce

Lawmakers in the House and Senate introduced legislation on Wednesday to address the shortage in the cybersecurity workforce. The Cyber Ready Workforce Act would establish a grant program within the Department of Labor whereby the Secretary of Labor shall...

LATEST NEWS

Cyber Attacks Against Federal Agencies Increase 1,300 Percent Between 2006 and 2015 – GOA

The United States Government Accountability Office (GOA) has issued a new report in which it outlines the complexity and scope of...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...

U.S. Judge Rules Bitcoin is Money

A federal judge issued a ruling on Monday, in the case of  affirming that Bitcoin qualifies as money. This decision is linked...

Security Researchers Demonstrate How to Remotely Hack a Tesla Model S

It goes without saying that the very connectedness of self-driving vehicles is also, without the shadow of any doubt, their biggest flaw....

U.S. Government Takes ‘Unprecedented Step’ of Providing Framework for Autonomous Vehicles

The Obama Administration has taken the "unprecedented step" of announcing what it termed a new Federal Automated Vehicles Policy to help...

IIC Publishes Industrial Internet Security Framework for IIoT Systems

The Industrial Internet Consortium (IIC), a global, public-private organization formed to accelerate adoption of the Industrial Internet of Things (IIoT), announced...

FEATURED

POPULAR

EVENTS

JOBS

VENDOR WATCH

Home JonB Headshot 1 324x235

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru  Home John Ackerly 324x235

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of...

Lawmakers Introduce Cyber Ready Workforce Act to Boost Cybersecurity Workforce

Lawmakers in the House and Senate introduced legislation on Wednesday to address the shortage in the cybersecurity workforce. The Cyber Ready Workforce Act would...

NEWS

BNP Paribas Expands Blockchain Platform to Issue Minibonds Via Crowdfunding

French multinational bank and financial services company, BNP Paribas Securities Services, said Monday it is expanding its blockchain platform for private...

HHS Awards Over $87 Million in Funding to Upgrade Health Centers’ IT

Health and Human Services (HHS) Secretary Sylvia M. Burwell announced on Thursday the award of more than $87 million in funding...

We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO

Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing...

Press Release: Government Cloud Adopters Plan to Nearly Double Cloud Use in Next Five Years

MERITALK STUDY REVEALS FEDERAL, STATE AND LOCAL, AND HIGHER EDUCATION CLOUD ADOPTERS PLAN TO NEARLY DOUBLE CLOUD USE IN NEXT FIVE YEARS

IBM, Bank of Tokyo-Mitsubishi UFJ to Use Blockchain Technologies For Projects

IBM announced Friday that it has signed a contract with the Bank of Tokyo-Mitsubishi UFJ (BTMU) to examine the design, management...

Avnet to Sell Technology Solutions Business Unit to Tech Data for $2.6 Billion

Avnet, Inc., a  global technology distributor, announced Monday that it has entered into an agreement to sell its Technology...

INTERVIEWS

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...

We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO

Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing...