SIGN UP FOR OUR NEWSLETTER Chinese media reported on Wednesday that President Xi Jinping has announced a major restructuring of the People’s Liberation Army to create what he called a “world-class military.” In addition to modernizing the PLA’s command structure and deploying more advanced equipment, the restructure is intended to put “greater emphasis on new […]

by

John Larkin It is hard to wake up and not hear about cybersecurity risks. The most recent example is that of the WikiLeaks publication of thousands of CIA covert computer and Internet of Things (IoT) hacking tools. It is difficult to estimate the impact that this will have on the hacking culture, but it will […]

by

Humans remain the weak link in corporate data protection, but you might be surprised that it isn’t only rank-and-file employees duped by phishing scams who pose risks. Some companies are lulled into a false sense of cybersecurity by vendors. You read that right:Some enterprises believe the shiny new technologies they’ve acquired will protect them from […]

by

Rhode Island has hired its first cybersecurity officer in former utility executive Mike Steinmetz, the state said in a Tuesday, April 18 news release. Steinmetz will serve as Gov. Gina M. Raimondo’s principal policy advisor on cybersecurity, and will develop and put into place a comprehensive state cybersecurity strategy. He is also serving as Rhode […]

by

Few IT leaders would deny that having staff with a wide range of backgrounds is an advantage. But with men still dominating the field it isn’t easy, and trying to get more women into cybersecurity is even harder. But it can be done, says Rinki Sethi, senior director of information security at Palo Alto Networks, […]

by

Israel is a world leader in cyber defense, and it all starts in the nondescript buildings of the IDF’s Cyber Defense Academy in central Israel. “We’ve stopped being a nation that just picks oranges. Everything starts and end with the idea of the start-up nation,” a senior officer in Israel’s C4I and IT Cyber Defense […]

by

In addition, there are concerns that cyber warfare in future military operations could include spoofing GPS signals or otherwise disrupting satellites.  Russian forces and their allies in Syria and Ukraine have actively employed electronic warfare systems, which could include these capabilities.  It seems more likely that Killer has similar gear that can find various signals […]

by