Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is...
This year, provisions that were ultimately left out of the massive annual Defense authorization bill—despite in some cases bipartisan agreement across both Congressional chambers—got the most...
The Pentagon has awarded its JEDI cloud contract replacement. The Pentagon on Wednesday announced the awardees of the Joint Warfighting Cloud Capability—or JWCC—contract, with Amazon Web Services, Google,...
Three vulnerabilities in the American Megatrends MegaRAC Baseboard Management Controller (BMC) software impact server equipment used in many cloud service and data center providers. The flaws...
The Cybersecurity and Infrastructure Security Agency (CISA) has added one more security vulnerability to its list of bugs known to be exploited in attacks. The flaw...
“Russian missiles can’t destroy the cloud,” Ukraine’s minister of digital transformation explained. LAS VEGAS—Last February, with Russian military forces bearing down on its nation, the Ukrainian...
Bug bounty platform HackerOne has launched a scheme to encourage customers to adopt a standard policy geared towards protecting hackers from potential legal problems. The Gold Standard Safe Harbor...
In this Help Net Security video, Frank Kim, CISO-in-Residence at YL Ventures, discusses the growing role of CISOs in investment firms and how their role as advisors...
In this interview with Help net Security, Brad Jones, VP of Information Security at Seagate Technology, talks about cybersecurity trends organizations will be dealing with soon, particlularly concerning cloud...
The United States government, through the Federal Communications Commission (FCC), has banned the sale of equipment from Chinese telecommunications and video surveillance vendor Huawei, ZTE, Hytera, Hikvision, and...