Electronic Engagement

 
Apple and Qualcomm unexpectedly announced a settlement as their case entered the second day of a hearing in the U.S. [...]
Source: Technews
ISC)² announced the availability of a range of new courses to its Professional Development Institute (PDI) portfolio. [...]
Source: Security Magazine
Global business travel spending reached $1.33 trillion in 2017 and is forecast to advance another 7.1 percent in 2018. [...]
Source: Security Magazine
Microsoft unveils a new offering to host classified information in a commercial cloud. Agencies are looking at it ahead of [...]
Source: Washington Technology
After a report revealed that Facebook used user data to leverage its relationships with other companies, researchers are stressing that [...]
Source: Kapersky Threatpost - Privacy
Parsons Corp.'s process to go public illuminates how they and other "Architecture, Engineering and Construction" firms have found their footing [...]
Source: Washington Technology
Defense logistics requires sophisticated software to manage the lifecycle of military programs. Here are six factors a successful system must [...]
Source: Washington Technology
The ramp-up to Apple's WWDC this June has begun, with reports circulating about the goodies the company will include in [...]
Source: Technews
The Defense Department wants to make contractors' cyber maturity a more important consideration before contracts are awarded. [...]
Source: Washington Technology
Twenty years after the Columbine High School shooting made practicing for armed intruders as routine as fire drills, many parents [...]
Source: Security Magazine
American drivers strongly support proposed safety measures to reduce automobile crashes and fatalities, and are themselves taking steps to make [...]
Source: Security Magazine
A copyright directive that some fear could break the Internet has cleared the final hurdle in the European Union. The [...]
Source: Technews
It is expected that 5G will move aggressively into the market, with near-complete major metropolitan coverage by the end of [...]
Source: Technews
A popular Australian smartwatch's tracking capabilities expose its user's locations, personal data and more. [...]
Source: Kapersky Threatpost - Privacy
Convincing phishing pages and millions of suspicious apps are plaguing tax season. [...]
Source: Kapersky Threatpost - Privacy
At SAS 2019, Recorded Future CTO discusses a new kind of high-profile influence campaign spotted using a new technique: Old [...]
Source: Kapersky Threatpost - Privacy
White hat hacker reverse engineers financial apps and finds a treasure trove of security issues. [...]
Source: Kapersky Threatpost - Cryptography
MacOS users, as well as Windows, are in the cross-hairs, especially those based in South Korea. [...]
Source: Kapersky Threatpost - Cryptography
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 [...]
Source: Kapersky Threatpost - Cryptography
Panelists react to missing noted cryptographer Adi Shamir who was denied a visa to enter the US to attend RSA [...]
Source: Kapersky Threatpost - Cryptography

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)