March 2016

DARPA is preparing for the threat You might not know this, but the Internet wasn’t built for you and me. Back in the 1960’s, which somehow seems like an eternity ago, DARPA (Defense Advanced Research Projects Agency) envisioned a network of computers that could collaborate on scientific and technological research projects from coast to coast. […]

by

In a meandering, 100-minute-long telephone interview with The New York Times last week, Donald Trump elaborated on some of the bold and belligerent foreign-policy prescriptions he’s hinted at in the past. He touched on nuclear weapons, spying, and the fight against ISIS, bringing his tried-and-true “we’re losing” doom and gloom to each topic. His proclamations […]

by

James Q. Lynch The Gazette More stories from James DES MOINES — In the escalating war on cybercrime, the U.S. Department of Justice last week unsealed indictments charging Iranian hackers with attacks on 46 major financial institutions that cost victims tens of millions of dollars. It also unsealed a complaint against the Syrian Electronic Army […]

by

Security pros consider the NIST framework an industry best practice, yet half of its adopters say its complete implementation involves a high level of investment. US organizations say the major investment required in fully implementing the NIST Cybersecurity Framework is hampering their full adoption of it, according to a survey report released by Tenable Network […]

by

March 03, 2016 Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco. Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco. In a session titled “The Dark Web and Cyberespionage,” attendees were presented […]

by

RIYADH: There is a strong need to develop scientific research in the field of information security through transfer and localization of technology in the Kingdom, said Prince Turki bin Saud bin Mohammed, president of the King Abdulaziz City for Science and Technology (KACST), here on Tuesday.He was speaking during the inauguration of the third Saudi […]

by

The Federal Retirement Thrift Investment Board’s Office of Enterprise Risk Management has been busy since it was first born about three years ago. The office is maturing and developing on schedule, said Jay Ahuja, FRTIB chief risk officer.  But it still has at least three more years to go before risk is fully integrated into the board’s culture […]

by

March 30, 2016 A new backdoor trojan created to siphon information has been detected by Symantec researchers. A new information siphoning backdoor trojan that has so far only used in Taiwan has been detected by Symantec researchers. Backdoor.Dripion has been used only in a small number of targeted attacks, but based on previous iterations, Symantec suspects […]

by

In April 2014, the FBI issued warnings about the healthcare industry’s vulnerability to cyberattacks. In particular, the agency called the possibility of increased cyberintrusions likely, given the combination of the shift to online systems and a lack of preparation by most organizations. Nearly two years later, the FBI has its hands full as those warnings […]

by