nsa

NSA Releases Advisory Addressing Risk from Transport Layer Security Inspection

The National Security Agency (NSA) has released a Cyber Advisory that addresses managing risk from Transport Layer Security Inspection (TLSI). The document defines TLSI (a security process that allows incoming traffic to be decrypted, inspected, and re-encrypted), explains some risks...

LATEST NEWS

Justice Department Indicts 80 in Substantial Email Scam and Money Laundering Scheme

The Justice Department on Thursday unsealed a 252-count federal indictment charging 80 defendants with involvement in a massive business email scam and money laundering...

DISA Launches SAFE to Allow Enterprise-Wide Ability to Safely Transfer Files in the DoD

The Defense Information Systems Agency (DISA) on August 15 launched the Department of Defense (DoD) Secure Access File Exchange (SAFE), to provide users with...

Hackers Can Downgrade Tor Network Efficacy Through Costly DoS Attack: Research

A new study has revealed that a hacker or a nation-sponsored bad actor can degrade the performance of the Tor network for a few...

NIST Releases Plan For Federal Engagement in the Development of AI Standards

National Institute of Standards and Technology (NIST) last week announced the release of its long-anticipated Plan for federal engagement and U.S. leadership on artificial...

UPS is Testing Delivery With Autonomous Vehicles

Atlanta-based shipping giant UPS revealed on Thursday that it is entering the self-driving vehicle space by investing in TuSimple, an autonomous driving company that...

Texas Hit With Ransomware Targeted Against 23 Organizations Connected to Local Government Departments

A cybersecurity incident on August 2019 in the U.S. state of Texas in which about 23 entities connected to smaller local governments where hit...

Legislation

FEATURED

US Grants Huawei Another 90-day Extension to Purchase From American Suppliers

The Trump administration has extended a deadline for U.S. businesses to cut ties with Chinese telecommunications firm Huawei, according to a statement by Department...

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even so, the...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down by regulations...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many enterprises are...

POPULAR

Exclusive: Cyber Is Battlefield Of Choice When Countries Disagree – FireEye Chief Security Strategist

NATO recently officially declared cyberspace a domain of warfare as the battle between nations shift to the so-called fifth domain. Lance Dubsky, Chief Security...

For BlackMesh, Scaling And Securing Sites Makes Business Sense As Demand For IaaS Soars

Cloud and infrastructure-as-a-service (IaaS) currently hold sway in the realm of IT, and with the growth in mobility, no other platform offers quite as...

EVENTS

JOBS

VENDOR WATCH

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of Commerce. Ackerly...

Lawmaker Urges Justice Department to Prevent Drones from Interfering with Firefighting

Senator Dianne Feinstein (D-Calif.) on Friday wrote to the Department of Justice to exercise its legal authority to prevent drones from interfering with firefighting...

NEWS

US Grants Huawei Another 90-day Extension to Purchase From American Suppliers

The Trump administration has extended a deadline for U.S. businesses to cut ties with Chinese telecommunications firm Huawei, according to a statement by Department...

DHS CISA Warns That Iranian Hackers Increasingly Using Destructive ‘Wiper’ Attacks

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs on Saturday released a statement in response to...

Legislators Introduce Bill to Force Social Media Firms to Disclose How Much They Make From User Data

Sens. Mark R. Warner (D-VA) and Josh Hawley (R-MO) on Monday introduced the Designing Accounting Safeguards to Help Broaden Oversight And Regulations on Data...

Hackers Target Mobile Phone Networks in Sophisticated Cyber Espionage Attack

Hackers compromised companies in more than 30 countries with the aim of gathering information on individuals in government, law-enforcement and politics, according to a...

Google to Purchase Analytics Firm Looker for $2.6 Billion

Google LLC today announced Thursday that it has entered into an agreement to acquire Looker, a privately held big-data analytics company, for $2.6 billion...

NSA Releases Advisory on BlueKeep Vulnerability

The National Security Agency (NSA) has released a cybersecurity advisory for CVE-2019-0708—a vulnerability dubbed BlueKeep. Although Microsoft has issued a patch, potentially millions of...

INTERVIEWS

US Grants Huawei Another 90-day Extension to Purchase From American Suppliers

The Trump administration has extended a deadline for U.S. businesses to cut ties with Chinese telecommunications firm Huawei, according to a statement by Department...

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even so, the...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down by regulations...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many enterprises are...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing machine to...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the OPM breach. OPM...