Electronic Engagement

 
Lockheed Martin's longtime CFO Bruce Tanner will retire early next year and be succeeded by another three-decade company veteran in [...]
Source: Washington Technology
Even as DOD seems to be full-steam ahead on modernization, sustainment spending continues to loom large for supply chain management [...]
Source: Washington Technology
Jack Gansler, former Under Secretary of Defense for Acquisition, has died at 84 and is being remembered for his work [...]
Source: Washington Technology
Anil Cheriyan, the former CIO of SunTrust Bank, will lead the GSA's Technology Transformation Services beginning next year. [...]
Source: Washington Technology
December has become consistent with the Chinese curse, "May You Be Born In Interesting Times." We are up to [...]
Source: Technews
A survey found that 45 percent of HR professionals view preparing for and responding to an active shooter or workplace [...]
Source: Security Magazine
A group of the world's largest international shipping associations have published an update to their cybersecurity guidelines. [...]
Source: Security Magazine
IACLEA has announced plans to open a Global Center for Campus Public Safety. [...]
Source: Security Magazine
The Executive Women's Forum on Information Security, Risk Management, and Privacy (EWF) announced the 2018 Women of Influence Award Recipients [...]
Source: Security Magazine
A newly-passed Australian law could allow the government to force tech companies to create backdoors in their products. [...]
Source: Kapersky Threatpost - Privacy
Microsoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity. [...]
Source: Kapersky Threatpost - Privacy
Rumors circulated this week that Microsoft will be replacing the core technology in its Edge browser for Windows 10 with [...]
Source: Technews
Linux and the open source business model are far different today than many of the early developers might have hoped. [...]
Source: Technews
Researchers identified a widespread campaign of brute force attacks against WordPress websites. [...]
Source: Kapersky Threatpost - Privacy
The company allegedly tried to hide away new policy changes that would collect Android app users' call and message logs. [...]
Source: Kapersky Threatpost - Privacy
Google hasn't released consumers from its filter bubble -- the package of personalized search results it delivers -- despite having [...]
Source: Technews
IDC analyst Joe Pucciarelli shares insights on the most relevant global trends and key predictions impacting CIOs, IT professionals and [...]
Source: CSO Online - Security Leadership
In this episode, host Maryfran Johnson talks with Vince Kellen, CIO, University of California at San Diego, about data science, [...]
Source: CSO Online - Security Leadership
Today’s digital security environment offers no shortage of opportunity for industry observers to fret about our collective shortcomings: our enterprises [...]
Source: CSO Online - Security Leadership
Firmware updates won't address the problem, so admins need to take other action. [...]
Source: Kapersky Threatpost - Cryptography

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)