Data breaches resulting in the compromise of personally identifiable information of thousands of Americans. Intrusions into financial, corporate, and government networks. Complex financial schemes committed by sophisticated cyber criminals against businesses and the public in general. These are just a few examples of crimes perpetrated online over the past year or so, and part of […]

by

KELLY MCEVERS, HOST: We’re going to hear now from the man who’s led the Justice Department’s National Security effort. And one of his big priorities has been protecting the U.S. from hackers. John Carlin sat down with NPR’s Carrie Johnson as he prepares to leave the government. CARRIE JOHNSON, BYLINE: When he took the job […]

by

Criminal Justice Information Services (CJIS) The FBI’s Criminal Justice Information Services Division, or CJIS, is a high-tech hub in the… … read more at: http://www.afcea.org/content/?q=Article-damage-cyber-espionage-looms-large

by

Between the chatter of corporate bankruptcies, emails, and “stamina” in last Monday’s presidential debate between Hillary Clinton and Donald Trump, an immensely important national security topic arose.   That topic? Cyber warfare.   When asked by Lester Holt who the culprits are behind the world’s cyber attacks and how those cyber attacks should be combatted, […]

by

Between the chatter of corporate bankruptcies, emails, and “stamina” in last Monday’s presidential debate between Hillary Clinton and Donald Trump, an immensely important national security topic arose.   That topic? Cyber warfare.   When asked by Lester Holt who the culprits are behind the world’s cyber attacks and how those cyber attacks should be combatted, […]

by

People sometimes ask me, “Why do you still use Yahoo email?!” I can’t help but try not to smile sheepishly. I write about breakthrough technology but use an email address domain from a company founded over 22 years ago… one of the first Internet success stories and one of the ’90s dot-com bubble darlings. The […]

by

People sometimes ask me, “Why do you still use Yahoo email?!” I can’t help but try not to smile sheepishly. I write about breakthrough technology but use an email address domain from a company founded over 22 years ago… one of the first Internet success stories and one of the ’90s dot-com bubble darlings. The […]

by

The Health Information Trust Alliance (HITRUST), an organization supporting the healthcare industry in advancing the state of information protection, has become the first healthcare information sharing organization to integrated and exchange sharing cyber threat indicators with the Department of Homeland Security’s (DHS) Automated Indicator Sharing (AIS) Program. The HITRUST Cyber Threat XChange (CTX), the health […]

by

HITRUST, a consortium of stakeholders collaborating to better secure protected health information, is the first healthcare cyber threat-sharing information organization to connect with the federal government’s cyber threat sharing program. The federal program, launched earlier this year, is the Automated Indicator Sharing Program of the Department of Homeland Security, designed to collect and disseminate cyber […]

by