June 2016

The government will get forecasts about cyber threat from tech giant Microsoft from now on. Bangladesh Telecommunication Regulatory Commission (BTRC) and Microsoft Corporation will sign a Memorandum of Understanding in this regard tomorrow afternoon, said Tarana Halim, stare minister for the telecommunication. “It will also be a non-disclosure agreement under which we will get information […]

How big and how fast will the cybersecurity market grow in five years? Inquiring minds want to know. While cybersecurity spending has grown by 35x over the last 13 years, most big analyst firms still expect decent but modest growth in the next five years. However, according to a new report from market intelligence firm […]

Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We’re here to connect the dots as leaders in government, policy and industry try to counter the rise in cyber threats. What lies ahead for Congress, the administration and the latest company under siege? Whether you’re […]

NEW YORK — Policymakers aren’t focused enough on cybersecurity threats facing the country’s electric grids as more of the infrastructure becomes connected to the internet, a think tank said Wednesday. “Cybersecurity has simply not been a priority,” said Mark Mills, a senior fellow at the Manhattan Institute and author of a forthcoming paper about the […]

(TNS) — San Antonio technology companies have raised $600,000 to create a new incubator program to mentor young cybersecurity companies with management advice, help finding funding. CyberSecurity San Antonio, an industry-driven program sponsored by the San Antonio Chamber of Commerce, announced Thursday the new Build Sec Foundry, located at the Geekdom co-working space in the growing tech […]

So have they or haven’t they? Ever since President Obama and Chinese President Xi Jinping agreed last September that commercial cyberespionage for profit is off limits, experts and policymakers have asked one burning question: Has Beijing really stopped or changed its operations? On Tuesday, US Assistant Attorney General John Carlin confirmed there had been drop in Chinese commercial cyberespionage, but added a needed […]

The infrastructure used by an Iranian cyberespionage group to control infected computers around the world has been hijacked by security researchers. Researchers from Palo Alto Networks came across the group’s activities earlier this year, but found evidence that it has been operating since at least 2007. Its main tool is a custom malware program dubbed […]

By Daniel Wilson Law360, Nashville (June 17, 2016, 2:41 PM ET) — A Kosovo man pled guilty in Virginia federal court to charges that he hacked the personal details of around 1,300 American troops and government personnel and put them at risk by posting that information on a Twitter account controlled by the Islamic State […]

By Jerod Powell, CEO, INFINIT Consulting, Inc. The contemporary business environment is essentially a small subsystem in the larger cyber world. Every enterprise, no matter how technically progressive or apprehensive about technology, is connected to and handles different streams of data. The current IT landscape is highly disruptive, but it does promise better business outcomes […]