NSA’s National Cryptologic Museum (NCM) is thriving and plans to keep growing as it welcomes a new Director. Dr. Vince Houghton, who brings a deep background in intelligence and history, joined the Agency last month after serving as historian and curator of the International Spy Museum in Washington, D.C. Dr. Houghton said he already is impressed with the professionalism of the current staff.
The University of West Florida will lead a coalition of 10 institutions designated as National Centers of Academic Excellence in Cybersecurity in establishing a program to address the critical national shortage of qualified cybersecurity professionals in the U.S. The National Security Agency selected UWF to oversee the program, which will launch in the spring and be funded by a two-year, $6 million grant.
Russian cyber actors from the GRU Main Center for Special Technologies (GTsST), field post number 74455, have been exploiting a vulnerability in Exim Mail Transfer Agent (MTA) software since at least August 2019, warns a new National Security Agency (NSA) cybersecurity advisory.
The U.S. National Security Agency (NSA) has released cybersecurity guidance, containing a snapshot of current, commercially-available collaboration tools available for telework use, along with a list of security criteria to consider when selecting which capability to leverage.
Several vulnerabilities have been found in Virtual Private Network (VPN) technology from various providers, putting sensitive data and networks at risk of compromise, says the New Jersey Cybersecurity & Communications Integration Cell (NJCCIC).
Within days of reports about the National Security Agency’s electronic surveillance efforts, it was revealed that French intelligence services operated a similar system with minimal oversight, The New York Times reports. Last week, with little public debate, the French legislature approved a law that critics fear would expand electronic surveillance of French residents and businesses. The provision was quietly passed as part of a routine military spending bill, and it defines the conditions under which intelligence agencies may gain access to or record telephone conversations, emails, Internet activity, personal location data and additional electronic communications, the article reports.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight how to plan, prepare for and build resilience to protests and other unplanned events, video surveillance tools for SMBs and more.