13 eyes

An Eye is Upon You! Perhaps many....

An Eye is Upon You! Perhaps many….

An Eye is Upon You! Perhaps many….
An Eye is Upon You! Perhaps many….
GSA makes dozens of awards on its much-anticipated potential $50 billion Alliant 2 IT and professional services contract vehicle. [...]
Sat, Nov 18, 2017
Source: Washington Technology
Billions of voice-activated Internet of Things devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed on [...]
Fri, Nov 17, 2017
Source: Technews
ImmixGroup analysts see plenty of uncertainty and challenges in today's civilian market but close customer relationships will drive success when [...]
Fri, Nov 17, 2017
Source: Washington Technology
Amazon said it will offer a fix for its Amazon Key delivery service that allows hackers to tamper with a [...]
Fri, Nov 17, 2017
Source: Kapersky Threatpost - Privacy
The newly-rebranded Hitachi Vantara Federal Corp. closes its deal to take in Brocade's portfolio of classified contracts and other sensitive [...]
Fri, Nov 17, 2017
Source: Washington Technology
Four companies will bid for technology insertion services task orders under a potential five-year, $326 million Navy contract. [...]
Fri, Nov 17, 2017
Source: Washington Technology
Organized retail crime is continuing to grow, with 67 percent of retailers surveyed reporting an increase in the past year, [...]
Fri, Nov 17, 2017
Source: Security Magazine
Anthony Levandowski, known for his work developing self-driving auto technology, reportedly has started the world's first artificial intelligence-based religion. Levandowski, [...]
Thu, Nov 16, 2017
Source: Technews
The White House released a charter document on Wednesday outlining how the U.S. government will disclose cyber security flaws and [...]
Thu, Nov 16, 2017
Source: Kapersky Threatpost - Privacy
In my last blog, I reviewed some new research from ESG and the Information Systems Security Association (ISSA), revealing that [...]
Thu, Nov 16, 2017
Source: CSO Online - Security Leadership
A new study looks at how the proliferation of connectivity is changing the way consumers engage with content, information and [...]
Thu, Nov 16, 2017
Source: Security Magazine
Cisco Systems issued patch that fixes a critical vulnerability impacting 12 products running the Cisco Voice Operating System software. [...]
Wed, Nov 15, 2017
Source: Kapersky Threatpost - Privacy
New version releases of browsers don't get the buzz they used to get, but Firefox Quantum is an exception. [...]
Wed, Nov 15, 2017
Source: Technews
Women have made inroads into the top leadership positions in corporate America. Today, 26 women are serving as CEOs of [...]
Wed, Nov 15, 2017
Source: Security Magazine
A team of researchers at the University of Eastern Finland say voice biometrics are vulnerable to spoofing attacks. [...]
Wed, Nov 15, 2017
Source: Security Magazine
This month, Microsoft's Patch Tuesday updates tackle fixes for 53 security bugs in Windows, Office, Internet Explorer, Edge, ASP.NET Core, [...]
Tue, Nov 14, 2017
Source: Kapersky Threatpost - Privacy
One of the great joys of reading is that you can do it anywhere. A relaxing bath is a prime [...]
Tue, Nov 14, 2017
Source: Technews
The FBI cannot access a cellphone belonging to the dead suspect in Sunday’s Texas shooting, a situation that could reignite [...]
Tue, Nov 07, 2017
Source: Kapersky Threatpost - Cryptography
Academic researchers size up weaknesses in the the code-signing Public Key Infrastructure and highlight three types of flaws. [...]
Tue, Nov 07, 2017
Source: Kapersky Threatpost - Cryptography
"IT Risk is well defined by the ISACA organization in the Risk IT Framework.  It says, “IT risk is business [...]
Tue, Nov 07, 2017
Source: CSO Online - Security Leadership
 Posted by at 3:09 am