“Are we organized correctly to defend our weapon systems from the cyber threats of the future?” asks Gen. John E. Hyten, who leads Air Force Space Command. “The answer is, ‘No, we’re not.’” The battle domains of space and cyber are divorced, largely, from the raw physical reality of war. To Hyten, these two uninhabited spaces […]

by

This training program for agents and brokers looks at cybersecurity risks and mitigation for businesses, and features insurance professionals, cyber experts, former FBI agents and “white hat” hackers. (Photo: Shutterstock) Most companies acknowledge that the question is no longer “if” a cyber attack will happen but rather “when” it will happen. Targeted attacks continue to […]

by

The number one threat to healthcare data isn’t the most obvious. Rather than malevolent, faceless hackers, it’s often an organization’s own employees who open the door to theft, malware, ransomware and a host of other problems, according to IBM’s 2016 Cyber Security Intelligence Index. Sixty percent of all attacks in 2015 were made by insiders […]

by

Ransomware has emerged as the most dangerous cyber threat for both organisations and individuals, with global losses now likely running to hundreds of millions of dollars, a new study says. Norton by Symantec, one of the global leaders in cyber security software, found that globally, consumers are the most likely victims of ransomware, accounting for […]

by

NEWTON, Mass. PETACH TIKVA, Israel–(BUSINESS WIRE)– While 82 percent of respondents believe the IT security industry is making progress against cyber attacks, those gains are undercut by egregious security practices in critical areas such as privileged account security, third-party vendor access and cloud, according to results from a new global survey commissioned and released by […]

by

Five nonprofits have been awarded National Institute of Standards and Technology (NIST) grants totaling nearly $1 million for projects supporting cybersecurity education, training and workforce development.   The grants have been distributed between five regions for projects that take a community approach to filling the increasing number of cybersecurity positions. The Regional Alliances and Multistakeholder […]

by

The sparsely populated Spratly Islands, a collection of hundreds of islands and reefs spread over roughly 165,000 square miles in the South China Sea, are very quickly becoming the center of one of the most contentious international disputes between world powers since the fall of the Soviet Union. Alarmingly, the use of cyber attacks in […]

by