Electronic Engagement

 
allscripts ransomware attack insider cover
There is a baseline for incident response — six phases familiar to anyone who has spent time around a SANS [...]
Source: CSO Online - Security Leadership
The Louisiana State Fire Marshal's Office has issued guidelines for installing locks on the inside of classroom doors to help [...]
Source: Security Magazine
The $20 billion ITES-2S vehicle has been extended by another two years as the Army works through the delays caused [...]
Source: Washington Technology
Dynetics has bested General Atomics to win phase three of DARPA's "Gremlins" program to build a drone that can take [...]
Source: Washington Technology
Lockheed Martin and SAS announced a collaboration to bring next generation analytics to the sustainment of the F-35 and other [...]
Source: Washington Technology
Mercury Systems is facing scrutiny from an activist investor that also put Kratos under the microscope earlier this year. What [...]
Source: Washington Technology
Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent [...]
Source: Kapersky Threatpost - Privacy
About 20 percent of the most popular Android Apps available through the Google Play Store contain open source components with [...]
Source: Technews
Microsoft, Oracle and Facebook, along with 31 other companies, have signed the Cybersecurity Tech Accord, an agreement aimed at defending [...]
Source: Technews
Looking for a qualified candidate or new job? CSO's security recruiter directory is your one-stop shop.The recruiters listed below can [...]
Source: CSO Online - Security Leadership
Threatpost talks to crypto expert Nate Cardozo, senior staff attorney with the Electronic Frontier Foundation at RSA Conference 2018 about [...]
Source: Kapersky Threatpost - Cryptography
Threatpost talks to crypto expert Nate Cardozo, senior staff attorney with the Electronic Frontier Foundation at RSA Conference 2018 about [...]
Source: Kapersky Threatpost - Privacy
Maryland Gov. Larry Hogan signed into law a bill to improve safety in Maryland classrooms. [...]
Source: Security Magazine
Mobile apps leak personal data via insecure ads that transmit ad-targeting data insecurely. [...]
Source: Kapersky Threatpost - Privacy
Not content with furnishing every other aspect of our homes, IKEA has continued its push into smart home territory with [...]
Source: Technews
Pennsylvania State Senator Dan Laughlin will propose putting tasers in school classrooms. [...]
Source: Security Magazine
With ransomware and distributed denial of service (DDoS) attacks on the rise, the average number of focused cyberattacks per organization [...]
Source: Security Magazine
After I considered Facebook CEO Mark Zuckerberg's testimony before Senate and House committee hearings last week, it became very clear [...]
Source: Technews
If you have no clue what I am talking about I promise to make amends in a minute or less. [...]
Source: CSO Online - Security Leadership
Now considered essential to driving profits, digital transformations are shifting from platform-first strategies to initiatives that leverage emerging technologies in [...]
Source: CSO Online - Security Leadership

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)