This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
More than 3,800 data breaches were reported from January through June 30, exposing over 4.1 billion records, according to the 2019 MidYear Data Breach Quickview Report.
Cybercrime campaigns and high-profile advanced persistent threat groups are shifting how they target victims and focusing more on intricate relationships with “secure syndicate” partnerships to disguise activity, according to the latest 2019 Cyber Threatscape Report from Accenture.
Citing the vital need for a secure U.S. industrial base, U.S. Senators Mike Crapo (R-Idaho) and Mark Warner (D-Virginia) have introduced bipartisan legislation to guard against attempts by China and others to undermine U.S. national security by exploiting and penetrating U.S. supply chains.
The Maryland Department of Transportation Maryland Port Administration (MDOT MPA) has been awarded more than $700,000 in the most recent round of funding through the Federal Emergency Management Agency’s (FEMA) Port Security Grant Program.
With so many devices and systems capable of connecting to networks and integrating with each other, cybersecurity today is a critical consideration for every organization. With each device that’s connected to a network representing a potential entry point for hackers, it’s important to ensure that all devices are protected to the highest possible level in order to avoid damaging fallout from a cyberbreach.
Security professionals must understand drones, conduct security, assess limitations and implement a drone response plan to mitigate its threats and attacks.