There is a consensus that aggression by one nation against another is a serious matter, but there is no comparable consensus about what constitutes aggression. Waging aggressive war was one charge against Nazi leaders at the 1946 Nuremberg war crimes trials, but 70 years later it is unclear that aggression, properly understood, must involve war, […]

by

With data breaches making the news ever more frequently, businesses are on the look out for new ways to identify and guard against threats. Cyber threat intelligence company DomainTools has released the results of a new survey conducted by the SANS Institute on the effectiveness of using threat hunting to aggressively track and eliminate cyber […]

by

IT Process Institute CEO Scott Allridge has cybersecurity advice for healthcare executives: Consider ITIL, the framework formerly known as the Information Technology Infrastructure Library. “Following ITIL best practices becomes the ultimate backstop for your security posture,” said Scott Alldridge, CEO of the IT Process Institute, a research firm that studies top-performing organizations and best practices. […]

by

The former head of the National Security Agency, the CEO of MasterCard and the chief security officer of ridehauling giant Uber are among those named to President Barack Obama’s Commission on Enhancing National Cybersecurity. The ten appointments fill out the membership of the group, which meets for the first time Thursday. The commission has been tasked to investigate ways the nation can strengthen […]

by

California Assemblymember Ed Chau has proposed “bug bounties” to discover unknown security vulnerabilities in California’s computer systems. CalChannel Frustrated that California’s cybersecurity readiness suffers from “underlying systemic issues,” two Assembly lawmakers have urged Gov. Jerry Brown to rethink how the state prepares for a potential cyberattack. The request by Assemblymembers Ed Chau, D-Arcadia, and Jacqui […]

by

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products. In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS outlines the eight technologies that range from malware analysis tools to behavior analysis platforms to […]

by

U.S. federal, state and local government agencies rank in last place in cybersecurity when compared against 17 major private industries, including transportation, retail and healthcare, according to a new report released Thursday. … read more at: http://www.nbcnews.com/tech/tech-news/u-s-government-worse-all-major-industries-cyber-security-n556461

by

The costs of business interruption due to a breach is the top cyber risk concern for businesses across all industries, according to a new survey of captives. Aon Global Risk Consulting, in its 2016 Captive Cyber Survey report, found that 95 percent of companies surveyed believe that the most important issue in cyber insurance is […]

by

U.S. federal, state and local government agencies rank in last place in cyber security when compared against 17 major private industries, including transportation, retail and healthcare, according to a new report released Thursday. … read more at: http://www.nbcnews.com/tech/tech-news/u-s-government-worse-all-major-industries-cyber-security-n556461

by

Robert Work GEOINT 2015(Photo: USGIF) In a multi-faceted offensive against the Islamic State terror group, the U.S. is striking in the cyber domain, according to the Pentagon’s second-in-command. “We are dropping cyber bombs. We have never done that before,” Deputy Defense Secretary Robert Work told reporters traveling with him on April 12, according to CNN. […]

by