Agencies told to beef up cyber security against threat from Anonymous
All entities under the Critical National Information Infrastructure (CNII) have been urged to beef up cyber security to protect themselves against hackers. Science, Technology and Innovation Minister...
View ArticleTHE AFTERMATH OF THE OPM HACK
When news first broke of the OPM hack back in June, few understood the massive scale of the attack. Originally thought to have affected 4 million federal employees, estimates quickly rose to over 22...
View ArticleWhat Healthcare Can Learn from the OPM Data Breach
The US Office of Personnel Management (OPM) announced earlier this summer that it had fallen victim to a large-scale cybersecurity attack. The OPM data breach further proved that regardless of size,...
View ArticleFallout Shelter Hacked Shortly After Release
Not too long ago earlier this morning, we brought you word that Android users would definitely rejoice in – Fallout Shelter has arrived on that particular mobile platform. Fallout Shelter happens to be...
View ArticleUpdates are coming for a telematics unit that hacked a Corvette
Mobile Devices Ingenierie says an update will require that security rules are applied to deployed dongles Security updates are being distributed for a telematics control unit (TCU) that security...
View ArticleU.S. Government Think Tank Welcomes Global Cybersecurity Innovator “Securonix”
LOS ANGELES, CA and WASHINGTON, DC — (Marketwired) — 08/12/15 — Reinforcing its role as a thought leader and innovator in the cybersecurity arena, Securonix today announced that the Institute for...
View ArticleExecutives Failing Hard Regarding Employee Cyber Security Awareness
Forbes published an article on Wednesday, August 12th, called 6 Observations About Cybersecurity Based On Two New Surveys. Between the PricewaterhouseCooper (PwC) and Black Hat surveys, roughly one...
View ArticleStarLink’s Solutions fuel government cybersecurity deployments in KSA in 2015
StarLink, the region’s trusted security-specialized “True” Value-Added-Distributor (VAD), has witnessed a drastic increase in cyberattacks on Government organizations in the Kingdom of Saudi Arabia in...
View ArticlePiracy, Netflix, NBN: Everything you need to know about technology this year...
2015 has been a bonkers year for tech so far, and we still have at least a new iPhone announcement to go. But with loads of new technology it can get confusing. Whether you’re confused setting up a...
View ArticleCybersecurity firm root9B planning San Antonio expansion
Colorado-based root9B, a high-ranking cybersecurity firm formed with the goal of preventing a “Cyber 9/11,” has announced plans to expand in San Antonio. “We look forward to being active participants...
View ArticleLack of training kits forces short reschedule of ethical hacking training...
WILLEMSTAD, Curacao — Even though two more of the trainers for the cyber security and ethical hacking training event are already in Curacao, organizers of the event were forced to consider a new date...
View ArticleHow to use Encryption Privacy Tools to Evade Corporate Espionage
ICIT’s most recent briefing entitled “How to Use Encryption and Privacy Tools to Evade Corporate Espionage” has been authored at the request of multiple entities who wish to take a proactive approach...
View ArticleAfricaHackOn, m:lab to provide Kenyan startups with cybersecurity training
m:lab East Africa has partnered technical computer security collective AfricaHackOn to launch a cybersecurity programme for Kenyan startups and entrepreneurs, informing participants how to strengthen...
View ArticleNewsletter California Inc.: A new home for cybersecurity experts — corporate...
Looking Ahead Bills to ponder: Fixing roads and regulating tobacco will top the agenda today when the California Legislature returns from its summer recess. Lawmakers have proposed tax and fee hikes to...
View ArticleCompanies hope cybersecurity experts in the boardroom can counter hacks
The board of directors at construction and engineering company Parsons Corp. needed to fill a seat two years ago. Naturally, they wanted someone with communication and leadership skills. They also...
View ArticleRod Vawdrey leaves Fujitsu for Nuix
Australian-owned cybersecurity company, Nuix, has appointed former corporate executive of Fujitsu A/NZ, Rod Vawdrey, to its team as chief operating officer. In the role, Vawdrey will take...
View ArticleBUSINESS Experts tackle cybersecurity from the inside
The company hired Peter Levin, who overhauled the Department of Veterans Affairs’ online health records system and now runs a data security company. “Healthcare tends to be at the front of the spear...
View ArticleIsraeli and UK universities sign cyber-security research deal
Haifa and Kent Universities are going to merge their expertise in a major deal to work on the global threat of cyber-security. The Cabinet Office in the UK announced that the Israeli and British...
View ArticleCybersecurity has link to Wild West TV
When studying various cybersecurity methodologies, I have often appreciated the wild west TV shows of the 1950s. When a fight broke out at the saloon on one end of town, the sheriff and the only deputy...
View ArticleHonolulu CC nationally recognized as cybersecurity training center
Honolulu Community College received its re-designation as a National Center of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y IA/CD) at the Colloquium for...
View Article
More Pages to Explore .....