TransUnion Data Breach Exposes Personal Information of 4.4 Million U.S. Consumers in Salesforce Attack

TransUnion, one of the three major U.S. credit reporting agencies, has confirmed a data breach impacting over 4.4 million people in the United States....

LATEST NEWS

Radisys, CORD Partner on Open Source EPC for the M-CORD Project to Accelerate 5G Deployments

CORD Project, the community advancing the open source service delivery platform that combines SDN, NFV, and elastic cloud services to redefine network access, on...

U.S. Cyber Insurance Market Booms Following Data Breach Worries: Report

Most traditional commercial general liability policies do not cover cyberrisks, but cyber incidents were ranked as the third-highest global business risk in 2016, Allianz's...

NIST Releases Cybersecurity Guide for Securing Manufacturing Industrial Control Systems

NIST’s National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Capabilities Assessment for Securing Manufacturing Industrial Control Systems. It addresses businesses’...

Engineers Fabricate World’s ‘First’ Semiconductor-Free Microelectronic Device

A team of researchers in the Applied Electromagnetics Group led by electrical engineering professor Dan Sievenpiper at UC San Diego say they have fabricated...

Industry Group Urges Senate to Act on IT Modernization Bill

The Professional Services Council (PSC), sent a letter last week to leaders in the Senate, urging the Senate to take action on H.R. 6004,...

DOE Awards Funding to RTI to Research Smart Grid Security Utilizing DDS Standard

Real-Time Innovations (RTI), an Industrial Internet of Things (IIoT) connectivity platform company, said Monday it received funding from the U.S. Department of Energy (DOE)...

FEATURED

POPULAR

SECURITY

TransUnion Data Breach Exposes Personal Information of 4.4 Million U.S. Consumers in Salesforce Attack

TransUnion, one of the three major U.S. credit reporting agencies, has confirmed a data breach impacting over 4.4 million people in the United States....

REGULATORY

EU Begins Enforcement of Landmark AI Law, Imposing Tough Restrictions and Fines

The European Union has officially begun enforcing its groundbreaking artificial intelligence (AI) law, marking a major step in global AI regulation. As of Sunday,...

FOCUS

Bipartisan Bill Would Bolster Security Defenses Against Open-Source Software Vulnerabilities

Sens. Gary Peters, D-Mich., and Rob Portman, R-Ohio, have proposed a bill to help protect federal and critical infrastructure systems by strengthening the security...

MORE NEWS

Tesla Acquires Germany’s Grohmann Engineering to Boost In-House Automated Manufacturing

Electric carmaker Tesla said Tuesday it has entered into an agreement to acquire Grohmann Engineering, an engineering company in Prüm, Germany, which will become...

Telecommunications Firm Windstream to Acquire Earthlink in $1.1 Billion Deal

U.S. telecommunications firm Windstream Holdings, Inc. said Monday it has entered into a definitive merger agreement with Earthlink Holdings Corp. under which Windstream and...

Dept. of Energy Awards $32 Million in Funding for Connected Tech Resulting in Energy Efficiency

The Energy Department’s Advanced Research Projects Agency-Energy (ARPA-E) on Wednesday announced up to $32 million in funding for what it called “10 innovative projects,”...

Lawmakers Urge FTC to ‘Use all Tools at its Disposal’ to Compel IoT Manufacturers Reinforce Security of IoT Devices

Reps. Frank Pallone, D-N.J., and Jan Schakowsky, D-Ill., wrote a letter on Thursday to Federal Trade Commission (FTC) Chairwoman Edith Ramirez urging the agency...

IoT Security 101: Researchers Demonstrate How to Launch a Citywide Bricking Attack

How to launch a citywide bricking attack? Too easy, thanks to the proliferation of IoT devices that have blanketed the landscape in recent times....

FBI Suggests Precautionary Measures to Mitigate DDoS Threats and IoT Compromise

The FBI has drawn attention to the vulnerability of internet of things devices, advocating for stronger measures to protect against DDoS attacks. “The exploitation of the...

EXECUTIVE