This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Dr. Kelly Fletcher, Performing the Duties of the Department of Defense (DoD) Chief Information Officer, talks about the department's cybersecurity priorities in a rapidly changing technology landscape.
Tigran Gambaryan and Matthew Price, two former special agents at the Internal Revenue Service, join the audit and investigations team at the cryptocurrency firm Binance and work to ensure cybersecurity in crypto transactions.
The advancement of interconnectivity and IoT-enabled equipment has brought a variety of new benefits to the enterprise, however, with this enhanced connectivity comes the possibility for risk. Even HVAC systems can be susceptible if they’re not safeguarded. As hackers modify their targets amid IT evolution, the ability to eliminate system vulnerabilities has never been more critical. In this article, we’ll offer guidance on implementing a cybersecurity strategy that encompasses power management for end-to-end solution.
Starting on November 16, 2020 the Maryland Innovation Institute (MISI) and its DreamPort Program and sponsor U.S. Cyber Command will hold a cyber exercise designed to highlight the importance of control systems' cybersecurity and critical infrastructure cybersecurity. The event, Hack the Building 2020, will have more than 45 offensive and defensive teams from industry, academia, civilian agencies and the Department of Defense participating to disrupt or take over a connected building.
The Minnesota Cyber Protection Team was created in 2017 as one of 11 similar units across the National Guard. The unit conducts threat-focused, intelligence-driven defensive cyber operations in response to ongoing or imminent threats as directed.
Microsoft has expanded its $100,000 bounty program Monday, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows’ anti-exploit technologies, Computerworld reports.
Right now, the bad guys are winning." It’s a bleak statement from Dave Frymier, the CISO for Unisys Corp., but one that many enterprise security executives need to hear.