What’s This? Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses. Nine companies — Airbnb, Atlassian, Docker, Dropbox, GoDaddy, Palantir, Square, Twitter, and Uber — recently founded the Vendor Security Alliance, an independent, non-profit coalition that aims to help member companies evaluate and assess […]

by

Automakers should make shielding the electronic and computer systems of vehicles from hackers a priority, developing layers of protection that can secure a vehicle throughout its life, U.S. regulators said on Monday. The cyber security guidelines issued by the U.S. National Highway Traffic Safety Administration are recommendations, not enforceable rules. However, they mark a step […]

by

Guidance from the National Highway Traffic Safety Administration for improving motor vehicle cybersecurity has attracted criticism from lawmakers who said that mandatory security standards were required. “This new cybersecurity guidance from the Department of Transportation is like giving a take-home exam on the honor code to failing students,” said Senators Edward J. Markey, a Democrat […]

by

Cybersecurity experts on Monday called for standardized security measures for connected webcams, printers and routers in the wake of a massive cyber attack spread by those devices. But in the meantime, billions of poorly secured “internet of things” (IoT) gadgets remain open for exploitation by criminals, corporate spies, activist hackers and nation states. “There is not a […]

by

Last summer, an audience of government officials, military personnel, and foreign ambassadors gathered in Aspen, Colorado, to hear John Carlin, then an assistant attorney general, speak about cyberattacks. The Aspen Security Forum, which is held every year at a breathtaking resort in the Rocky Mountains, is the sort of event where national security wonks go […]

by

THIRUVANANTHAPURAM: A couple of Kerala government websites too suffered cyber attacks amidst reports of a cyber war between Indian and Pakistan hackers on the backdrop of the tension on the border. This has prompted the state government’s IT wing to step up vigil.  The website of the state Food Safety Commissionerate and a Wayanad-based dairy […]

by

Award-winning journalists Fred Kaplan and Brooke Gladstone will hold a public conversation on the secret history of cyber war when they visit the Lawrence Family Jewish Community Center in La Jolla.on Nov. 6th. The talk is scheduled to begin at 7 p.m. at the center, which is located at 4126 Executive Drive. For tickets, call 858-362-1348.  […]

by

Financial advice firms that step up cybersecurity through technological improvements may be ignoring the biggest source of data breaches: their own employees, Justin Kapahi writes in ThinkAdvisor. That’s because measures such as firewalls, encryption and multi-factor authentication don’t do anything by themselves to prevent hacker attacks against a company’s workers, according to Kapahi, technical director […]

by

The new industrial internet, or the Internet of Things (IoT), has created a buzz around the ability of billions of connected devices across the globe to communicate information between each other and the cloud. With the IoT, smart devices, sensors and big data are leveraged to send and analyze data in order help both consumers […]

by

The new industrial internet, or the Internet of Things (IoT), has created a buzz around the ability of billions of connected devices across the globe to communicate information between each other and the cloud. With the IoT, smart devices, sensors and big data are leveraged to send and analyze data in order help both consumers […]

by