March 2018

  Even before the recent ransomware attack on the City of Atlanta, both county- and city-level governments in Bartow have been taking precautionary steps to protect their electronic information from hackers.  In the wake of that major security breach, however, there’s a renewed focus on upgrading and safeguarding Bartow’s municipal cyber-infrastructure — although most local […]

by

Bitcoinist.net · March 31, 2018 · 7:00 pm <!– Excerpt Cyber attacks already take a heavy toll on companies the world over, and things are only going to get worse. However, R3Sec offers a solution to minimize intrusion time while making life miserable for would-be cybercriminals. Cyber Attacks Cost Companies Billions Cybersecurity threats can cost […]

by

Cyber attacks have become a tool of statecraft in this technology-driven age. Today, nations succeed or fail in large part based on how effectively they develop, implement and protect new technologies. Last week, the U.S. Department of Justice revealed details of an extensive nation-state cyber espionage campaign targeting non-military entities such as universities, businesses and […]

by

Mike Cerre: Once inside, hackers can disrupt a network’s operations, like they did last year to the British Health System, forcing hospitals to down. Or they can steal confidential information, like Equifax’s credit reports on more than 145 million Americans. So far, the most serious cyber-security breaches of U.S. defense and intelligence networks were inside […]

by

“This alert [from the Department of Homeland Security and the Federal Bureau of Investigation] provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation and critical manufacturing sectors.” — Joint DHS and FBI memorandum, March 15, 2018 One curiosity of the cyber-age is […]

by

Security apparatus This coincided with individual nation states building up their own particular “security apparatus” around the internet such as the China’s “great firewall” and Russia’s Sorm-2 programme. As a result, he said the main players are today unable and/or unwilling to come up with a regulatory framework for relations in cyber space, which is […]

by