Justice Department Indicts 80 in Substantial Email Scam and Money Laundering Scheme

The Justice Department on Thursday unsealed a 252-count federal indictment charging 80 defendants with involvement in a massive business email scam and money laundering scheme. The 145-page indictment, unsealed Thursday, said the 80 named individuals are charged with conspiracy to...

LATEST NEWS

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

Germany Orders Facebook to End Collection of WhatsApp User Data: Facebook to Appeal

The Hamburg Commissioner for Data Protection and Freedom of Information on Tuesday issued an administrative order that prohibits Facebook from collecting and...

Microsoft, Bank of America Partner to Incorporate Azure Blockchain as a Service in Trade Finance

Microsoft Corp. and Bank of America Merrill Lynch are collaborating on blockchain technology to fuel transformation of trade finance transacting. The...

German Automakers, Mobile Telcoms Firms Partner to Accelerate Autonomous Car Tech With 5G

AUDI AG, BMW Group, Daimler AG, Ericsson, Huawei, Intel, Nokia and Qualcomm Incorporated, announced Tuesday the formation of the “5G Automotive...

Sen. Mark Warner Urges SEC to Investigate Yahoo Breach

Senator Mark Warner (D-VA) has called on the Securities and Exchange Commission (SEC) to investigate whether Yahoo properly notified the public and...

Lawmakers Form Bipartisan Congressional Blockchain Caucus

A bipartisan group of lawmakers on Monday announced the creation of a Congressional Blockchain Caucus dedicated to the advancement of sound public...

FEATURED

US Grants Huawei Another 90-day Extension to Purchase From American Suppliers

The Trump administration has extended a deadline for U.S. businesses to cut ties with Chinese telecommunications firm Huawei, according to a statement by Department...

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

POPULAR

Exclusive: Cyber Is Battlefield Of Choice When Countries Disagree – FireEye Chief Security Strategist

NATO recently officially declared cyberspace a domain of warfare as the battle between nations shift to the so-called fifth...

Microsoft Proposes Cybersecurity ‘Rules’ To Guide Nation-States

With the emergence of cyber as the new battlefield of choice for global conflicts, Microsoft has proposed what it calls “cybersecurity...

EVENTS

JOBS

VENDOR WATCH

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of...

Legislators Introduce Bill to Force Social Media Firms to Disclose How Much They Make From User Data

Sens. Mark R. Warner (D-VA) and Josh Hawley (R-MO) on Monday introduced the Designing Accounting Safeguards to Help Broaden Oversight And Regulations on Data...

NEWS

GE, Bosch collaborate on IIoT Interoperability

GE and Bosch announced Monday they are partnering to shape the connected world through a collaboration between the software divisions of...

Grab, NuTonomy Launch On-Demand Robot Taxis in Singapore

nuTonomy, a developer of state-of-the-art software for self-driving cars, and Grab, Southeast Asia’s leading ride-hailing app, announced on Friday a partnership...

Hyperloop, Super High-Speed Mode of Transportation Set for 2020

Hyperloop Transportation Technologies and Hyperloop One, two main firms competing to bring Elon Musk’s concept of a Jetsons-like futuristic mode of transportation...

China Unveils World’s Largest Radio Telescope

The largest radio telescope in the world was opened for business on Sunday in a mountainous region of southwest China's Guizhou Province,...

IBM Also Joins the Blockchain Frenzy: Partners With China UnionPay

Not willing to be left out of the growing frenzy surrounding blockchain technology, IBM announced Friday that it is partnering with...

House Unanimously Passes Modernizing Government Technology Act

The Modernizing Government Technology (MGT) Act passed on a voice vote by the House, Thursday. The legislation sponsored by Representatives Will Hurd,...

INTERVIEWS

US Grants Huawei Another 90-day Extension to Purchase From American Suppliers

The Trump administration has extended a deadline for U.S. businesses to cut ties with Chinese telecommunications firm Huawei, according to a statement by Department...

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...