Home iot health2 324x235

HSCC Releases Medical Device and Health IT Joint Cybersecurity Plan

The Healthcare and Public Health Sector Coordinating Council (HSCC) on Wednesday released new recommendations for manufacturing and managing the security of medical devices for clinical practice. The voluntary, consensus-based Health Industry Cybersecurity Practices (HICP) is the culmination of a year...

LATEST NEWS

Tesla’s Self-Driving Autopilot Feature May Have Caused Second Fatal Crash in China

China’s state-owned CCTV reported Wednesday that a man driving a Tesla Model S struck a street sweeper on a highway in...

DoD Supports Strong Encryption for Military: Commercial Encryption Tech Critical

The US Department of Defense (DoD) supports strong encryption to protect military capabilities and commercial encryption technology that is critical to U.S....

World’s First Self-Driving Uber Cabs go Live in Pittsburgh

Uber announced Wednesday that the world’s first Self-Driving Ubers are now on the road in the Steel City. A year and a...

DARPA Seeks Proposals to Develop City-Wide Drone Dragnet Systems

The Defense Advanced Research Projects Agency (DARPA) is soliciting innovative research proposals for wide area surveillance of small unmanned aerial systems...

Volkswagen, CYMOTIVE Technologies Partner to Form Cybersecurity Company for Vehicles

Volkswagen said Wednesday that it forming an automotive cybersecurity company, in conjunction with newly founded CYMOTIVE Technologies. Agreement aims at developing cybersecurity solutions for...

Google’s Project Zero Prize: Hack Android Device and Win $200,000

Google announced Tuesday that it is starting a new contest to capitalize on the success of previous vulnerability programs. The Project...

FEATURED

POPULAR

EVENTS

JOBS

VENDOR WATCH

Home JonB Headshot 1 324x235

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru  Home John Ackerly 324x235

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of...

Draft U.S. Senate Bill Proposes Fines, Prison Time for Data Privacy Violations

Sen. Ron Wyden, D-Ore., on Thursday released a discussion draft of sweeping new legislation that would give consumers greater control over their personal...

NEWS

Press Release: CAQ: Auditors Can Play a Role in Meeting Growing Cybersecurity Needs of Organizations

Washington, DC – As leaders gather in Washington today for the Internet Security Alliance’s (ISA) Top of the Hill cybersecurity conference, the...

OpenText to Acquire Dell EMC’s Enterprise Content Division for $1.62 Billion

opentext.com, a provider of Enterprise Information Management (EIM), announced Monday that it has entered into a definitive agreement to acquire Dell...

Software Giant SAP Commits $1 Billion to Sapphire Ventures

Sapphire Ventures today announced it has closed on $1 billion in new capital commitments. All of the money comes from German...

Congress Passes Blockchain Support Bill

A non-binding resolution calling for a national technology innovation policy that includes supportive language for digital currencies and blockchain technology has been...

Britain’s National Cyber Security Centre Proposes National Firewall Against Hackers

Ciaran Martin, the director general of cyber at GCHQ said Plans are being made by the UK's surveillance agency, GCHQ, to create...

Coalition of Media and Technology Companies Seek to Filter ‘Fake’ News

Twitter, Facebook and 30 news and technology companies including the New York Times, Washington Post, BuzzFeed News, Agence France-Presse, and CNN, have...

INTERVIEWS

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...

We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO

Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing...