January 2018

 Print The U.S. Army is developing new cyberwar strategies, recognizing that the nature of cyberwar reduces the advantages that America has had over its enemies through its traditional military, reports Joseph Farah’s G2 Bulletin. “Today’s adversaries have studied how the U.S. Joint Force prefers to operate and have adapted by developing capabilities that contest U.S. operations on land, […]

by

The Homeland Security Department wants to make it easier for cybersecurity researchers around the world to track down the information they need to solve emerging threats. The DHS Science and Technology Directorate awarded California-based tech firm Inferlink a $750,000 contract to build advanced search functions into one of the agency’s key cyber research databases. Researchers […]

by

New Delhi:  Security agencies’ personnel, including those from special commando forces such as the National Security Guard or the NSG, should be trained in tackling the emerging “fourth dimension” of threats of cyberattacks, Home Minister Rajnath Singh said. Addressing the closing ceremony of the 8th All India Police Commando Competition at the National Security Guard […]

by

Recently, there’s been an uptick in the adoption of the NIST Cybersecurity Framework, a set of guidelines aimed at helping organizations improve their overall cybersecurity process. In December 2017, NIST released the second draft of its framework. Among the updates were two critical additions to the Identity Management, Authentication and Access Control guidance. These updates address […]

by

‘+ ‘ ‘+__tnt.truncateStr(oAsset.title,85,’…’)+’ ‘+ ‘ ‘+__tnt.truncateStr(oAsset.summary,iTextTrun,’…’)+’ ‘+ ‘ … read more at: http://www.swvatoday.com/news/richlands_clinch_valley/article_28ef1fd6-fd4c-11e7-8389-d7b0204883d0.html

by

VP and Chief Security Officer, EMEA of Palo Alto Networks, Greg Day shares his cybersecurity predictions for the future. Beyond his work there, Greg also sits on the UK National Crime Agency steering committee Cyber adversaries will extend further into ransomware, OT systems and cryptocurrencies. In recent years we have seen ransomware used for profit. […]

by

When it comes to cybersecurity, what comes immediately to mind? Chances are it’s corporate denial-of-service attacks, credit card information theft, financial hacking, perhaps even a ransomware incident involving hospital information systems. Unfortunately, trucking also is at increasing risk of cybersecurity threats, and the risk is only going to grow as automated and other advanced technologies […]

by