Electronic Engagement

 
The National Security Agency released details on 25 existing vulnerabilities that Chinese state-sponsored threat groups are using to try to [...]
Source: Washington Technology
The Defense Department has codified NIST SP 800-171 and set a deadline of Nov. 30 for contractors to register their [...]
Source: Washington Technology
The Defense Information Systems Agency is telling industry that more time is needed to get a multi-billion dollar IT services [...]
Source: Washington Technology
The Homeland Security Department gives industry their first detailed glimpse at how the agency is undertaking a massive cloud services [...]
Source: Washington Technology
Hall County, Ga. confirmed it experienced a network outage as a result of a ransomware attack. The cyberattack impacted critical systems [...]
Source: Security Magazine
The government will use a class deviation to modify all existing defense and civilian contracts in an effort to force [...]
Source: Washington Technology
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released two joint cybersecurity advisories [...]
Source: Security Magazine
Digital Shadows released its quarterly research report focusing on the latest trends in ransomware. Unfortunately, for vulnerable organizations everywhere, Digital Shadows Photon [...]
Source: Security Magazine
During a press conference on election security at FBI Headquarters with FBI Director Christopher Wray, Director of National Intelligence John Ratcliffe [...]
Source: Security Magazine
The National Association of Regulatory Utility Commissioners Center for Partnerships and Innovation today announced the release of a series of [...]
Source: Security Magazine
There's no question that hackers are getting increasingly ambitious -- the average ransom demand increased from about $29,000 in 2018 [...]
Source: Technews
The BizOps Coalition hopes to bridge the gap between technology investments and business outcomes through an effort called the BizOps [...]
Source: Technews
Red Hat, a major provider of open source solutions, has never had a comprehensive document guiding associate participation in open [...]
Source: Technews
Google found itself in the crosshairs of government regulators Tuesday as the U.S. Justice Department filed a civil lawsuit against [...]
Source: Technews
Healthcare records were digitized to help prevent medical errors such as misdiagnoses and mistakes with medication, but electronic health records [...]
Source: Technews
Hundreds of medical patients taking cancer drugs, Premarin, Lyrica and more are now vulnerable to phishing, malware and identity fraud. [...]
Source: Kapersky Threatpost - Privacy
The company already patched an API flaw that allowed a security researcher to use the app to find the real [...]
Source: Kapersky Threatpost - Privacy
"Nuke Bizzle" faces 22 years in prison after brazenly bragging about an identity-theft campaign in his music video, "EDD." [...]
Source: Kapersky Threatpost - Privacy
Companies that use Broadvoice's cloud-based VoIP platform may find their patients, customers, suppliers and partners to be impacted by a [...]
Source: Kapersky Threatpost - Privacy
Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face. [...]
Source: Kapersky Threatpost - Privacy

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)