Internet ubiquity and cybersecurity are two sides of the same coin. The rising number of internet users in India—which crossed 400 million this year—has been accompanied by growing cyber crimes, resulting in a 19-fold increase over the last 10 years, according to a report by IndiaSpend. Against this backdrop, the imperative for cybersecurity has never […]

Today’s automobile is rapidly becoming a computer on wheels, with more microprocessing power than can be found in a typical home or office. It’s not uncommon for a modern vehicle to use more than 100 million lines of code to control everything from the engine management system to the onboard infotainment technology. By comparison, there […]

How often do you hear about someone you know dealing with either identity theft, compromised banking or social media credentials or their information out on the web being sold? Medical, Identity, Financial, Legal, Political, Business. All for sale. It used to be that this information was dumped out onto the “dark web” and then sold […]

WRIGHT-PATTERSON AIR FORCE BASE, Ohio (WDTN) — The Air Force Institute of Technology Center (AFIT) for Cyberspace Research has launched its first ever cyber security competition. More than 40 cadets gathered around several tables inside an AFIT building — split up into teams. The goal: to learn how to handle a new type of battlefield. […]

July 18, 2016 NATO CCDCOE urged to promote cooperation in training of cyber-defence experts as the cyber realm declared a theatre of war. Cooperation in cyber-defence training urged by Finnish Defence Forces chief of general staff vice admiral The need for international cooperation in training cyber-defence experts was emphasised by Finnish Defence Forces chief of […]

Job Description: Function: U. S. IndiaAERS Service Area: AnalyticsService Line/ Market Offering: Vigilant Cyber ThreatManagementWork Location: Hyderabad/ Bangalore Role/ Job Description: Experience in information security and controls. Should have played a lead role in client engagements (global exposure). Exposure to methodologies, such as OWASP preferred. Information Security Audit. Penetration Testing – Network, Host, Applications (Ethical […]

iGo navigation software developer NNG, controlled by David Wiernik and Kobi Halpern, announced today (Monday) that it had acquired control of automotive cyber security company Arilou Technologies. This acquisition joins NNG’s acquisition of US human machine interface (HMI) prototyping firm Nfusion some 18 months ago. pThe value of this deal was not made public but […]