A federal grand jury in Atlanta, Ga. returned an indictment last week charging four members of the Chinese People’s Liberation Army (PLA) with hacking into the computer systems of the credit reporting agency Equifax and stealing Americans’ personal data and Equifax’s valuable trade secrets.
The University of Wisconsin-Whitewater will offer one of the first online Master of Science in Cybersecurity programs in the state of Wisconsin to help meet regional demand for protection against cybersecurity attacks.
Taking place across the U.S. and the world, cybersecurity conferences can offer unique opportunities for cybersecurity professionals, such as hands-on workshops, networking and certifications. They also provide cybersecurity leaders with greater security awareness of threats, tactics and best practices needed to effectively thwart attacks on the systems and assets they protect. Here, Security brings you a list of the top 20 cybersecurity conferences in the U.S. in 2020.
Back away from the snooze button. This is a $29 million wake-up call you can’t afford to miss. In January 2019, Yahoo’s board agreed to pay the enormous $29 million settlement to its shareholders as the result of cyberattacks that compromised three billion Yahoo user accounts. It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying attention to cyber risks. But are they?
There seems to be a consensus for advocates of private Internet use that encryption is a good thing, and that encryption of DNS is needed to prevent network operators from gaining visibility into the sites and services their users lookup (and then visit). Two protocols have been created to achieve this encryption: DNS over TLS (DoT) and DNS over HTTPS (DoH). While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:
A new report on the working life of the CISO examines the impact of continued stress on the mental health and personal lives of CISOs, and drills down into the causes of stress including poor work life balance and a lack of support from the board.
This month, Security magazine highlights John McClurg, Senior VP and CISO at Blackberry, and the evolving role of the CISO. Also, we highlight Tim McCreight, Acting CSO for the city of Calgary, Alberta, and discuss if civilians can truly Stop the Bleed and how to calculate ROI for better security. Industry leaders discuss public references and their impact on security careers, information security frameworks and convergence trends in 2020.