With the 2016-2017 school year already underway, it’s time to draw attention to an ongoing and very serious problem facing the US education system: our schools are ill-equipped to face the mounting threats posed by hackers. While the...Show More Summary
China is now allowing foreign companies to join Technical Committee 260 (TC260), a key government committee in an effort to define cybersecurity standards. Microsoft was also invited to join this committee to take an active part in drafting rules. TC260 originally has 48 members and it was expanded in January to 81 members, mainly includes […]
Chinese authorities have invited foreign hi-tech companies to participate in activities of the government committee aimed at elaboration of cybersecurity rules for such companies.
Exciting things are happening these days at the intersection of digital technology and financial services. The fintech startup ecosystem is thriving, thanks in part to an infusion of $14.5 billion globally in venture funding in 2015, up from $7.3 billion in 2014. Fintech companies are creating and rolling out a [...]
US technology corporation Apple has issued a global security update to address a vulnerability in its mobile operating system following the attempted breach into an iPhone belonging to Arab activist Ahmed Mansoor, cybersecurity company Lookout said in a news release on Thursday.
China is taking a more inclusive tack in imposing cybersecurity standards on foreign technology companies, allowing them to join a key government committee in an effort to ease foreign concerns over planned domestically-set controls...
You can now take advantage of a simple and free tool that will help you determine how mature your company's cybersecurity operations are.
Clinton generally favors continuing Obama's cyber policies, while Trump calls for more cyber warfare and surveillance. Clinton generally favors continuing Obama's cyber policies, while Trump calls for more cyber warfare and surveillance. Show More Summary
In the pithy words of Monzy Merza at TechCrunch, the annual Black Hat briefings are an opportunity for the hoi-polloi "to drink from the firehose." While the lions' share of know-how and information will no doubt be devoured and processed by the brainiest of cybersecurity experts and hackers, the rest......
China has launched a quantum-encrypted satellite that could prove a major cybersecurity breakthrough if it proves truly “hack proof.” The implications of the recent satellite launch was came via Abu Dhabi-based The National. The experimental...Show More Summary
CYBERSECURITY: New York Times Says Suspected Russian Hackers Targeted Moscow Bureau. “We are constantly monitoring our systems with the latest available intelligence and tools,” Times spokeswoman Eileen Murphy told the newspaper. “We have seen no evidence that any of our internal systems, including our systems in the Moscow bureau, have been breached or compromised.” Earlier […]
Russian cybersecurity firm Kaspersky Labs has finally c […]
Newspaper says its Moscow bureau was the target of a cybersecurity breach but that there is no evidence hackers were successful.
BROOKLYN, New York -- With the outsourcing of microchip design and fabrication worldwide, a $350 billion business, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. These "Trojan horses"...Show More Summary
Hospitals, doctor’s offices, and other care facilities could be doing a better job of protecting medical records, according to a new study that looked at U.S. health care providers’ cybersecurity. The Healthcare Information and Management...Show More Summary
(Marine NewsWire) Ship connectivity, smart data and cybersecurity will be central themes on the agenda at the fifth SHIPPINGInsight Fleet Optimization Conference & Exhibition.
Bessemer Venture Partners just took three local cybersecurity start-ups under its wing.
Security researchers and “white hack” hackers work hard to weed out potential exploits in software and networks that could be used for malicious intents. How do they stay ahead of the threats, and what can you do to protect yourself? Read more...
This week there was a lot of reaction to the DNC's creation of a Cybersecurity Board that doesn't include a single cybersecurity expert, and both our first place comments (as well as a couple editor's choices) came in response to that post. Show More Summary