The American Civil Liberties Union has accused the FBI of gambling with cybersecurity by failing to disclose to Apple the method used to access the San Bernardino iPhone, reports the WSJ. Chris Soghoian, principal technologist at the ACLU, said the FBI is facing “a million-dollar question, and really what it comes down to is, does the FBI prioritize […]

Ben Dickson is a software engineer and freelance writer. He writes regularly on business, technology and politics. How to join the network When it comes to cybersecurity issues, we always seem to be dealing with either shortages or excess. Everywhere there’s talk of how data breaches are growing in number, size, severity and cost, and […]

In 2014 the absolute hottest sub-sector of technology was cybersecurity, and with good reason. In what seemed like a weekly occurrence, everybody from the U.S. government to major big-box retailers to you name it were getting hacked and valuable information was being compromised. The surge in cyber-crime also put a huge bid under the top […]

Over the past month, we’ve published a host of articles about cyberwar as part of our third installment of Futurography—a new project from Future Tense in which we explore a different technological issue each month. We’ve seen experts discuss the weapons of cyberconflict, explore the fuzzy rules of engagement, interrogate the “attribution problem,” and much more. […]

by

What’s This? Shared cyberthreat intelligence will soon be a critical component of security operations, enabling organizations to better protect their digital assets and respond more quickly to emerging threats. On March 17, the US Department of Homeland Security announced the deployment of the Automated Indicator Sharing (AIS) system, which allows the exchange of cyberthreat intelligence […]

by

MONTREAL–(BUSINESS WIRE)–Castle Hall, the three-time winner of “Best Global Due Diligence Firm” in the Hedge Fund Awards and Alternative Investment Awards, is pleased to announce that Vladimir Rabotka has joined the firm as Director – Security and Systems Administration. In this role, Mr. Rabotka will assume responsibility for Castle Hall’s internal cyber security policies and […]

by

The European Union’s General Data Protection Regulation (GDPR) provides an opportunity to rethink information security, according to Palo Alto Networks. “Hopefully the new regulation expected to be in force by spring 2018 will prove to a catalyst for change,” said Greg Day, the security firm’s chief security officer for Europe. “It is time for most […]

by

Vahid Heydari, doctoral student in computer engineering, presents his poster in Boston. UAH computer engineering doctoral student Vahid Heydari’s poster on “Preventing Remote Cyber Attacks against Aircraft Avionics Systems” was recently named the best poster at the 11th International Conference on Cyber Warfare and Security in Boston. “Receiving the best poster award means we are […]

by