work  Home work 324x235

Lawmakers Introduce Cyber Ready Workforce Act to Boost Cybersecurity Workforce

Lawmakers in the House and Senate introduced legislation on Wednesday to address the shortage in the cybersecurity workforce. The Cyber Ready Workforce Act would establish a grant program within the Department of Labor whereby the Secretary of Labor shall...

LATEST NEWS

Self-Driving Cars Increasingly Targeted by Vandals in Arizona

Self-driving vehicles have increasingly become the targets of vandals in Arizona with the police there recording at least 21 incidents over the past two...

HCL Tech to Acquire Select IBM Software Products for $1.8 Billion

HCL Technologies will purchase some software assets from U.S.-based IBM Corp for $1.8 billion, according to a statement by the companies on Friday....

BT Removes Huawei Equipment From 5G Network Core

Britain’s BT Group said on Wednesday it was removing Huawei Technologies’ equipment from the heart of its 5G mobile network when it is rolled...

NYPD Unveils 14 Newly Acquired Drones and Special Unit to Operate Them

The New York Police Department (NYPD) on Tuesday announced its Unmanned Aircraft System (UAS) program, which will be comprised of newly acquired Unmanned...

Waymo Launches Commercial Self-Driving Taxi Service

Alphabet’s Waymo on Wednesday unveiled its commercial self-driving service, Waymo One, to hundreds of early riders who have already been using their technology. Riders will...

Scammers go Low-Tech to Target Senior Citizens

The FTC issued a warning on Monday about a ruse by scammers to get people to part with money in the form of...

FEATURED

POPULAR

EVENTS

JOBS

VENDOR WATCH

Home JonB Headshot 1 324x235

We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone

More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...

EXCLUSIVES

Virtru  Home John Ackerly 324x235

Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO

John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of...

Lawmakers Introduce Cyber Ready Workforce Act to Boost Cybersecurity Workforce

Lawmakers in the House and Senate introduced legislation on Wednesday to address the shortage in the cybersecurity workforce. The Cyber Ready Workforce Act would...

NEWS

FTC Recommends Precautions to Prevent identity Theft Following Marriott Breach

The Federal Trade Commission (FTC) on Monday released an alert to provide affected users with recommended precautions against identity theft after the recent...

DHS, FBI, NCCIC Issue Alert on SamSam Ransomware

The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the Federal Bureau of Investigation (FBI) on Monday issued an...

Quora Hacked: 100 Million Users Affected

Q&A website Quora disclosed on Monday that one of its systems was accessed without authorization by hackers on Friday, with the user data...

Verizon-Owned Oath to Pay $5 Million for Violating Children’s privacy

New York Attorney General Barbara Underwood on Tuesday announced a record settlement with Oath, Inc., formerly known as AOL, for violating the Children’s...

Dem Lawmakers Query Law Enforcement’s Use of Amazon’s Controversial Facial Recognition Software

Eight democratic lawmakers sent a letter to Amazon CEO Jeff Bezos on Thursday reiterating their concern about Amazon’s facial recognition technology, Rekognition, and...

Tesco, Volkswagen Partner to Provide Largest Retail Electric Vehicle Charging Network in the UK

Britain’s biggest retailer Tesco and German car maker Volkswagen said Friday they have teamed up to develop an electric vehicle charging network in...

INTERVIEWS

Management and Control of Data a Key Inhibitor to Federal Cloud Adoption – NetApp

Tight budgets and the need for greater flexibility and agility in government IT has led to a rise in cloud adoption. Even...

Exclusive: The Consensus is That FedRAMP is Broken and Confidence Lost – Avnet

Government cloud adoption is definitely showing an upward trend as federal, state and local agencies hampered by limited resources and bogged down...

IoT is a Very Scary Environment: We Have Only Seen The Tip of The Iceberg – Cyber adAPT

Defense in depth is the best solution with regards to cybersecurity, many security experts agree. With the upward trend in BYOD, many...

Interview: Consumer IoT Security Best Practices With Cisco Talos

It is common knowledge that the internet of things is shockingly insecure. The possibility of hackers leveraging the connectedness of your washing...

If You Could Give Less Than an F Grade, OPM’s Management Deserves a G Grade Over the Breach – Ntrepid CEO

  Ntrepid's Richard Helms explains the reason why browser protection, not identity protection, is the best solution for handling the aftermath of the...

We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO

Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing...