It’s one more issue for jobless Americans and state workforce agencies to be concerned about. The U.S. Department of Justice warned this week that it’s receiving...
Rep. Adam Smith, D-Wash., suggested a 500-ship Navy is inadequate if adversaries are able to disrupt command and control systems. House Armed Services Committee Chair Adam...
The federal government should consider hardware-enabled security approaches. Because cyber criminals have proven over time that they are capable of circumventing the wealth of software-based security...
The federal government turned to technology during an unprecedented 2020 marked by the COVID-19 pandemic. Unprecedented challenges in 2020 ushered in monumental changes in operations and...
Two in three UK-based organizations are likely to increase their cybersecurity spending in 2021 despite the unprecedented financial toll exacted by Covid-19, according to a survey of...
The European Banking Authority (EBA) took down all email systems after their Microsoft Exchange Servers were hacked as part of the ongoing attacks targeting organizations worldwide....
US bank and mortgage lender Flagstar has disclosed a data breach after the Clop ransomware gang hacked their Accellion file transfer server in January. In December,...
The US Cybersecurity and Infrastructure Security Agency (CISA) is taking over the administration of the .GOV top-level domain (TLD) as its new policy and management authority....
Unpatched network-attached storage (NAS) devices are targeted in ongoing attacks where the attackers try to take them over and install cryptominer malware to mine for cryptocurrency....
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s...