A clever variant of phishing scams is proliferating among enterprises, forcing CIOs to up their game even as they are still refining their cybersecurity practices to contend with various zero-day attacks. Called whaling, the social engineering grift typically involves a hacker masquerading as a senior executive asking an employee to transfer money. Jay Wessland, CTO […]

by

SecureWorks is poised to end the longest drought in technology initial public offerings in seven years, but whether others will soon follow is an open question. SecureWorks, the cybersecurity arm of Dell Inc., is set to price its shares after markets close Thursday in what would be the first tech IPO in four months. Investors […]

by

Starr Companies has formed an agreement to offer services from NYA International (NYA) and Abernathy MacGregor as part of the organization’s newly launched Cyber and Terror Response offering. The coverage provides comprehensive coverage for the losses associated with cyber attacks, workplace violence, political violence, and acts of terrorism. The coverage also offers coordination services including […]

by

i U.S. Secretary of Defense Ashton Carter, shown here at the Pentagon in March, has said the “new breed of warrior” — cyberwarriors — will be expected to fight just as hard as their colleagues on conventional battlefields. … read more at: http://www.npr.org/sections/parallels/2016/04/20/475005923/rules-for-cyber-warfare-still-unclear-even-as-u-s-engages-in-it?utm_medium=RSS&utm_campaign=storiesfromnpr

by

LTG Alan Lynn, Director of the Defense Information Systems Agency and Commander of the Joint Force Headquarters- Department of Defense Information Networks, delivers a keynote address at CyberCon 2015 Conference at the Ritz-Carlton Pentagon City in Arlington, Va., on Wed., Nov. 18, 2015.(Photo: Mike Morones/Staff) It’s a figure that gets thrown around, but the Defense […]

by

INDUSTRY Industry cautious toward DHS cyber threat-sharing system By Washington Technology staff Apr 20, 2016 Despite facilitating machine-to-machine sharing of cyber threat indicators between the federal government and the private sector, the Homeland Security Department’s Automated Indicator Sharing system has not been a big hit with the private sector, according to FCW. John Felker, National […]

by