Mike Pence’s cyberrecord As Indiana’s governor, Pence established a reputation for seeing cybersecurity through a business-focused lens and for emphasizing law enforcement’s need for greater resources to fight hacking. During his run as governor, he also pushed for tax breaks to draw in more infosec jobs into the state. In April, Pence announced the formation […]

by

Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more. The transport system isn’t working, traffic lights are blank, immigration is in chaos and all tax records have disappeared. The internet has been […]

by

LAS VEGAS (Black Hat USA 2016 Booth No. IC-16), Aug. 2, 2016 — Demisto, Inc., an innovator in Security Operations technology, today announced an open industry standard (COPS, Collaborative Open Playbook Standard) to build and share cyber threat incident response playbooks, facilitated with the introduction of Demisto Free Edition, the free version of Demisto’s Bot-powered […]

by

Michael Daniel, special assistant to the president and the cybersecurity coordinator, speaks at the U.S. Chamber of Commerce Aug. 4.(Photo: Harvard Zhang) President Barack Obama’s top cybersecurity adviser said the next president should keep focusing on cybersecurity concerns by forming strong partnerships between government and the private sector. Michael Daniel, cybersecurity coordinator for the Obama […]

by

ANALYSIS/OPINION: With the theft and leaking of Democratic National Committee data, dramatic headlines are filling the pages of our newspapers. Calls for action are heard daily. Whatever we might do in direct response, though, the best reaction over the long term might simply be quiet and sustained investment in STEM (science, technology, engineering, mathematics) education. […]

by

LAS VEGAS (CNNMoney) – There’s now money to be made in Pokemon extermination. Citing a concern that Pokemon Go players are wandering into private land and near electrical equipment, power utility companies in Florida have hired cybersecurity company LookingGlass to pull Pokemon off the map. “We’re now in the business of killing Pokemon,” LookingGlass CEO […]

by

Giant refrigerator-sized supercomputers battled each other on Thursday in a virtual contest to show that machines can find software vulnerabilities. The result: the supercomputers time and time again detected simulated flaws in software. It represents a technological achievement in vulnerability detection, at a time when it can take human researchers on an average a year […]

by

ANALYSIS/OPINION: With the theft and leaking of Democratic National Committee data, dramatic headlines are filling the pages of our newspapers. Calls for action are heard daily. Whatever we might do in direct response, though, the best reaction over the long term might simply be quiet and sustained investment in STEM (science, technology, engineering, mathematics) education. […]

by

Every day it seems like there’s another hack, password theft, or leak. Both government agencies and private companies are regularly attacked, by intruders just looking for sensitive data to sell, or foreign actors looking for valuable information. That alone is reason enough for a Presidential candidate to at least have an educated, informed cybersecurity policy. […]

by

A dozen years ago the Defense Advanced Research Projects Agency (DARPA) held its first “grand challenge” to see if autonomous automobiles could cross a 240-kilometer stretch of the Mojave Desert on their own. Mechanical problems and mishaps ended the race before any of the competitors had gone more than 12 kilometers. DARPA, the U.S. Department […]

by