Electronic Engagement

 
GSA makes dozens of awards on its much-anticipated potential $50 billion Alliant 2 IT and professional services contract vehicle. [...]
Source: Washington Technology
Billions of voice-activated Internet of Things devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed on [...]
Source: Technews
ImmixGroup analysts see plenty of uncertainty and challenges in today's civilian market but close customer relationships will drive success when [...]
Source: Washington Technology
Amazon said it will offer a fix for its Amazon Key delivery service that allows hackers to tamper with a [...]
Source: Kapersky Threatpost - Privacy
The newly-rebranded Hitachi Vantara Federal Corp. closes its deal to take in Brocade's portfolio of classified contracts and other sensitive [...]
Source: Washington Technology
Four companies will bid for technology insertion services task orders under a potential five-year, $326 million Navy contract. [...]
Source: Washington Technology
Organized retail crime is continuing to grow, with 67 percent of retailers surveyed reporting an increase in the past year, [...]
Source: Security Magazine
Anthony Levandowski, known for his work developing self-driving auto technology, reportedly has started the world's first artificial intelligence-based religion. Levandowski, [...]
Source: Technews
The White House released a charter document on Wednesday outlining how the U.S. government will disclose cyber security flaws and [...]
Source: Kapersky Threatpost - Privacy
In my last blog, I reviewed some new research from ESG and the Information Systems Security Association (ISSA), revealing that [...]
Source: CSO Online - Security Leadership
A new study looks at how the proliferation of connectivity is changing the way consumers engage with content, information and [...]
Source: Security Magazine
Cisco Systems issued patch that fixes a critical vulnerability impacting 12 products running the Cisco Voice Operating System software. [...]
Source: Kapersky Threatpost - Privacy
New version releases of browsers don't get the buzz they used to get, but Firefox Quantum is an exception. [...]
Source: Technews
Women have made inroads into the top leadership positions in corporate America. Today, 26 women are serving as CEOs of [...]
Source: Security Magazine
A team of researchers at the University of Eastern Finland say voice biometrics are vulnerable to spoofing attacks. [...]
Source: Security Magazine
This month, Microsoft's Patch Tuesday updates tackle fixes for 53 security bugs in Windows, Office, Internet Explorer, Edge, ASP.NET Core, [...]
Source: Kapersky Threatpost - Privacy
One of the great joys of reading is that you can do it anywhere. A relaxing bath is a prime [...]
Source: Technews
The FBI cannot access a cellphone belonging to the dead suspect in Sunday’s Texas shooting, a situation that could reignite [...]
Source: Kapersky Threatpost - Cryptography
Academic researchers size up weaknesses in the the code-signing Public Key Infrastructure and highlight three types of flaws. [...]
Source: Kapersky Threatpost - Cryptography
"IT Risk is well defined by the ISACA organization in the Risk IT Framework.  It says, “IT risk is business [...]
Source: CSO Online - Security Leadership

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)