Dr. Kelly Fletcher, Performing the Duties of the Department of Defense (DoD) Chief Information Officer, talks about the department's cybersecurity priorities in a rapidly changing technology landscape.
Tigran Gambaryan and Matthew Price, two former special agents at the Internal Revenue Service, join the audit and investigations team at the cryptocurrency firm Binance and work to ensure cybersecurity in crypto transactions.
The advancement of interconnectivity and IoT-enabled equipment has brought a variety of new benefits to the enterprise, however, with this enhanced connectivity comes the possibility for risk. Even HVAC systems can be susceptible if they’re not safeguarded. As hackers modify their targets amid IT evolution, the ability to eliminate system vulnerabilities has never been more critical. In this article, we’ll offer guidance on implementing a cybersecurity strategy that encompasses power management for end-to-end solution.
Starting on November 16, 2020 the Maryland Innovation Institute (MISI) and its DreamPort Program and sponsor U.S. Cyber Command will hold a cyber exercise designed to highlight the importance of control systems' cybersecurity and critical infrastructure cybersecurity. The event, Hack the Building 2020, will have more than 45 offensive and defensive teams from industry, academia, civilian agencies and the Department of Defense participating to disrupt or take over a connected building.
The Minnesota Cyber Protection Team was created in 2017 as one of 11 similar units across the National Guard. The unit conducts threat-focused, intelligence-driven defensive cyber operations in response to ongoing or imminent threats as directed.
Microsoft has expanded its $100,000 bounty program Monday, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows’ anti-exploit technologies, Computerworld reports.