A new report analyzes the federal government’s approach to infrastructure cybersecurity as a key strategy document is getting a rewrite....
It’s simple: If you are using a legacy ecosystem, your compliance is at risk. The fact that your security hasn’t yet been compromised is no evidence of...
Nearly daily we see new stories of cybercriminals breaching security walls, stealing valuable data, and then holding it hostage in return for money. Companies risk exposing...
It’s all too common to see “fear appeals” used to motivate users to keep their guards up against the vast amount of cybercriminal activity that occurs...
Microsoft and Amazon Web Services are working to create preconfigured templates for defense agencies. Microsoft and Amazon Web Services are assisting the Defense Information Systems Agency’s...
CISA’s acting director identified ways the government is working to improve information sharing about cybersecurity incidents between agencies. The Agriculture Department’s National Finance Center was not...
China will soon harness AI to supplant Russia as the world leader in information warfare, a DIA leader said. The U.S. military isn’t keeping up with...
Defense and security thought leaders outlined problems and priority areas such a strategy would need to address to counter China and ensure U.S. prosperity. Ambitious ideas...
A Cypriot man has been jailed in the US over a scam that involved extorting website operators with stolen personal information. Joshua Polloso Epifaniou, 22, of Nicosia, threatened...
The rapid shift to a work-from-home model caused by the Covid-19 pandemic has ramped up penetration testing in enterprise environments, but questions remain over whether or not current...
Microsoft has blamed a key rotation issue for a large-scale 365 outage that affected many of its services on Monday and Tuesday. The outage – which took...
Recent Comments