Home neo urban 1808082 960 720 324x235

DHS CISA Warns That Iranian Hackers Increasingly Using Destructive ‘Wiper’ Attacks

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs on Saturday released a statement in response to the recent rise in malicious cyber activity, including spear phishing and brute force attacks,...

LATEST NEWS

DOE Awards $40 Million in Funding for Grid Modernization Initiative

The Department of Energy (DOE) last week announced $40M in FY19 funding for the Grid Modernization Initiative (GMI). The GMI, a crosscutting initiative...

International Ransomware Attack Could Cost $193B in Economic Damages: Report

A new report from the Cyber Risk Management (CyRiM) project has projected that an international ransomware attack could cost $193 billion in damages....

US Intelligence Officials Warn China, Russia Pose Biggest Espionage and Cyberattack Threats

China and Russia possess cyber capabilities capable of disrupting US critical infrastructure, including power networks, US companies, the military and election systems. Iran and...

Apple Facetime Privacy Breach: New York AG and Governor Announce Investigation

New York Attorney General Letitia James and Governor Andrew Cuomo on Wednesday announced an investigation into Apple’s failure to warn consumers about the...

Justice Department Announces Efforts to Disrupt Joanap Botnet Used By North Korean Hackers

The Justice Department on Wednesday announced what it called “an extensive effort” to map and further disrupt, through victim notifications, the Joanap botnet...

Airbus Says Systems Breached in Cyberattack

Airbus on Wednesday said it had detected a cyberattack on its commercial aircraft business information systems which resulted in unauthorized access to data. Affected...

FEATURED

POPULAR

EVENTS

JOBS

VENDOR WATCH

Home JonB Headshot 1 324x235

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru  Home John Ackerly 324x235

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of...

Legislators Introduce Bill to Force Social Media Firms to Disclose How Much They Make From User Data

Sens. Mark R. Warner (D-VA) and Josh Hawley (R-MO) on Monday introduced the Designing Accounting Safeguards to Help Broaden Oversight And Regulations on Data...

NEWS

Researchers Develop System to Generate Song Lyrics That Match the Style of Specific Artists

Researchers at the University of Waterloo, Canada, say they have developed a system for generating song lyrics lines conditioned on the style of a...

NCSC Launches Campaign to Help Private Sector Tackle Threats From Nation State Actors

The National Counterintelligence and Security Center (NCSC) on Monday said it is distributing videos, brochures, and other informative materials to help the private...

Delivery Robot Goes up in Flames: Manufacturers Blame ‘Human Error’

An autonomous food delivery robot caught fire on a Berkeley, California walkway on Friday. The robot is part of a fleet of robots manufactured...

Self-Driving Cars Increasingly Targeted by Vandals in Arizona

Self-driving vehicles have increasingly become the targets of vandals in Arizona with the police there recording at least 21 incidents over the past two...

HCL Tech to Acquire Select IBM Software Products for $1.8 Billion

HCL Technologies will purchase some software assets from U.S.-based IBM Corp for $1.8 billion, according to a statement by the companies on Friday....

BT Removes Huawei Equipment From 5G Network Core

Britain’s BT Group said on Wednesday it was removing Huawei Technologies’ equipment from the heart of its 5G mobile network when it is rolled...

INTERVIEWS

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...

We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO

Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing...