Another firm is challenging the Federal Trade Commission’s authority to regulate corporate cybersecurity.
The Department of Homeland Security has failed to follow many of its own cybersecurity policies, exposing the agency’s networks to unnecessary risks, according to federal auditors. An inspector general’s report last month faulted the department for using outdated security controls and Internet connections that are not verified as trustworthy, as well as for not reviewing […]
Akamai Technologies Inc. agreed to buy Prolexic Technologies Inc. for about $370 million in cash, expanding its cybersecurity offerings.
U.S. online sales, including those made on “Cyber Monday,” are expected to hit a new record this holiday season, providing another avenue for retailers to lock in sales but exposing shoppers to more cybersecurity hazards. Read full article >>
In this second part of our discussion with Alert Logic’s Misha Govshteyn, we discuss the road ahead next year for Alert Logic. Misha Govshteyn is the VP of Emerging Products. Govshteyn is responsible for security strategy, security research and software … Continue reading ?
CyberSecurity. 2014. What is going to be out there in terms of threats, products and trends? There’s plenty of opinions about this because security in the industry is so widespread by disciplines. That’s the modern security environment. So we sought … Continue reading ?
On a bit of a programming note, all month long in the month of December, SiliconANGLE will be featuring cybersecurity stories that focus on 2014 and beyond. We have gathered a number of thought leaders, executives and leading engineers to … Continue reading ?
Over the past decade, the U.S. has witnessed unprecedented transformation of the control systems that the electric sector uses to make, manage, and move power. Over the same period, legislators and regulators have become increasingly...Show More Summary
"There is simply no excuse for the Federal Government to be such a poor leader" in cybersecurity, reads a newly-released report from the President's Council of Advisors on Science and Technology, warning the government to update its systems. Show More Summary
Think you're too small to catch the attention of hackers? Big mistake. Your company might be exactly what they want. For many years, the average American small business was an unlikely target for a sophisticated cyberattack. Fewer financial resources and a relatively unknown brand worked in your favor to ward off hackers. Show More Summary
Report finds that government "rarely follows accepted best practices."
WASHINGTON (Reuters) - The U.S. government itself seldom follows the best cybersecurity practices and must drop its old operating systems and unsecured browsers as it tries to push the private sector to tighten its practices, technology advisers told P...
David Cowan, a partner Bessemer Venture Partners, has been investing in cybersecurity and technology startups since 1992. Mr. Cowan spoke with Risk & Compliance about trends in the data security space, and about the risk lessons to be taken from the problems with Healthcare.gov, the much criticized Obamacare exchange.
Knowledge of the deadly Stuxnet worm that wreaked havoc with Iran’s nuclear infrastructure has been public for more than three years now, but cybersecurity experts continue to stumble upon new revelations – with the latest one being that Stuxnet had … Continue reading ?
It's been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin. Read more...
The House Science, Space, and Technology Committee held a hearing yesterday on the cyber security of the healthcare.gov website. The prepared testimony is available on the Committee’s website. The testimony of so-called “white hat hacker” David Kennedy reflected the findings
WASHINGTON (Reuters) - The Pentagon said on Tuesday it had approved new rules that would require defense contractors to tighten their computer security procedures and to report any cyber intrusions that resulted in the loss of controlled technical info...
The next generation hackers may be taking to sound waves, and the Navy is understandably spooked. Citing the cutting-edge new destroyer U.S.S. Zumwalt, retired Capt. Mark Hagerott, deputy director of cybersecurity for the U.S. Naval Academy, said that the ship is heavily protected against common hacking techniques. Show More Summary
Cybersecurity, an urgent priority in U.S.-China talks earlier this year, was notably absent from Treasury Secretary Jacob Lew’s public talking points in his latest visit to Beijing.