Cyber Security
We should build security into the foundation of programs. Our current approach to cybersecurity, specifically within the public sector, is not working. We continue...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
We should build security into the foundation of programs. Our current approach to cybersecurity, specifically within the public sector, is not working. We continue...
Here are the news and updates you may have missed. Senator Ron Wyden, D-Ore., is drawing attention to the role encryption keys played in...
In a first, every agency got an A on at least one metric. But a new column on telecom transition brought several agencies down....
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business...
The FBI should establish a “formalized bureau-wide dark web strategy” to address operational shortcomings in how it tackles illegal darknet activities, a Department of...
FILE – This June 6, 2013 file photo, shows the sign outside the National Security Agency (NSA) campus in Fort Meade, Md.All fingers are...
Attackers can bypass password checks in applications that use Bouncy Castle’s OpenBSDBcrypt class because of recently discovered cryptographic mistakes in the widely used encryption library. The authentication bypass vulnerability (CVE-2020-28052)...
A team of security researchers has developed a DIY appliance to detect stalkerware and other malware on smartphones. TinyCheck is open source software designed...
FILE – In this Nov. 13, 2014, file photo Vice President Joe Biden, with Ebola Response Coordinator Ron Klain, left, and White House Senior...
Europol and the European Commission have launched a new decryption platform that will help boost Europol’s ability to gain access to information stored in encrypted...
Recent Comments