This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Clark Atlanta University (CAU) and Augusta University (AU) have forged a partnership between the CAU Department of Cyber-Physical Systems and the School of Computer and Cyber Sciences at Augusta University.
The University of West Florida and the Jikei College Group in Japan announced a partnership that aims to enhance global cybersecurity workforce development.
Differences in cultural values have led some countries to tackle cyber attacks with increased internet regulation, while others have taken a ‘hands-off’ approach to online security.
Cryptocurrency theft and scams stands at $4.4 billion, the lowest it has been in two years, according to the Cryptocurrency Anti-Money Laundering Report.
The Cybersecurity and Infrastructure Security Agency (CISA) is teaming up with election officials and private sector partners to develop and pilot an open source post-election auditing tool ahead of the 2020 elections.
What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO's communicate the business value of this strategy?
The Cybersecurity and Infrastructure Security Agency (CISA) issued a draft binding operational directive, BOD 20-01, which will require federal civilian executive branch agencies to publish a vulnerability disclosure policy (VDP).
The Common Weakness Enumeration (CWE™) released its Top 25 Most Dangerous Software Errors (CWE Top 25), a demonstrative list of the most widespread and critical weaknesses that can lead to serious vulnerabilities in software.