Electronic Engagement

 
Like many federal systems integrators, Vectrus also finds itself on a continuous tech scouting mission but one that is tied [...]
Source: Washington Technology
Developer interfaces used by Security Research Labs researchers to turn digital home assistants into ‘Smart Spies’. [...]
Source: Kapersky Threatpost - Privacy
The U.S. Department of Homeland Security (DHS) announced a partnership with Houston Mayor Sylvester Turner and Houston Airport System (HAS) [...]
Source: Security Magazine
A majority of Americans (44 percent) believe their personally identifiable information (PII) has been stolen as a result of a [...]
Source: Security Magazine
The Medical Device Innovation Consortium (MDIC) announced it has been awarded $2.8 million in funding by the U.S. Food and [...]
Source: Security Magazine
Across the United States, Americans congregate in houses of worship. However, those soft targets are vulnerable, and recently, have been [...]
Source: Security Magazine
A vpnMentor’s research team discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and [...]
Source: Security Magazine
Vectrus has done its part in clearing the company's largest recompete and is already looking ahead on continuing its turnaround [...]
Source: Washington Technology
The Army is exploring how to improve interoperability and lessen reliance on the Defense Department's secret networks to collaborate with [...]
Source: Washington Technology
The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies. [...]
Source: Kapersky Threatpost - Privacy
Cerner is planning to buy AbleVets, a fast growing small business, in a move that expands its footprint and capabilities [...]
Source: Washington Technology
Many companies put a value on hiring veterans and here's how SAIC is supporting veterans by using a scholarship to [...]
Source: Washington Technology
The Solus Project is alive and well and continues to offer a fresh approach to uncomplicating the computer desktop. That [...]
Source: Technews
A cryptomining infection spread to half of the workstations at a major international airport. [...]
Source: Kapersky Threatpost - Cryptography
As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect [...]
Source: Technews
San Francisco officials want to get ahead of the emerging technology curve by prequalifying and regulating startup tech proposals before [...]
Source: Technews
Developers have patched a vulnerability in Sudo, a core command utility for Linux, that could allow a user to execute [...]
Source: Technews
Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today. [...]
Source: Kapersky Threatpost - Privacy
A new flagship smartphone, a slick refresh of Pixelbook Go, some home gadget improvements and a revamp of its wireless [...]
Source: Technews
Researchers create digital dossiers of mobile users scraped from Tor network traffic. [...]
Source: Kapersky Threatpost - Privacy

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)