Recent hacks of the Democratic National Committee, the Democratic Congressional Campaign Committee and election databases have increased fears that cybercriminals will try to interfere with the upcoming U.S. presidential election.
Concerns leading up to election day on November 8 could
Government information technology executives increasingly are focused on cybersecurity preparedness but they are having trouble recruiting IT talent, according to surveys released by Alexandria-based Grant Thornton Public Sector.
Two Grant Thornton annual surveys — one focused on state chief information
Eighteen US states have requested сybersecurity help from the US Department of Homeland Security ahead of presidential elections.
Eighteen US states have requested help from the US Department of Homeland Security to reinforce their cyber networks ahead of upcoming elections,
The results of an attack on the industrial internet of things could be as bad a Bhopal or Chernobyl, warn some the largest corporations in the world.
A consortium of some of the largest multinational corporations in the world has
The Air Force is beginning to see glimmers of progress under a sweeping plan that aims to eventually give its weapons systems the same amount of cybersecurity attention the service devotes to its traditional IT networks. But the effort is
AS THE UNITED States barrels toward November elections, officials are still looking for last-minute fixes to ensure that the patchwork of voting technology used around the country can fend off the increasingly troubling prospect of hacker attacks. And in the
Zimbabwe’s draft ICT legislation on cybercrime, electronic transactions, and data has drawn a lot of attention in the past month as an increasing number of citizens pay close attention the impact that these laws will have in their lives.
On September 6, the White House announced the appointment of Brigadier General (retired) Gregory J. Touhil to the newly created role of Federal Chief Information Security Officer (CISO). As the first U.S. CISO, Brig Gen (ret) Touhil will drive
Ashish Chhetri, son of Meghraj Chhetri and Rita Chhetri has won the Australia Government hack competition (Smart Cities & Collaborative Economy category) for his project Aaya.
The competition required participants to use government data released for the hack over a
Today, New America’s Cybersecurity Initiative released A Brief History of Law Enforcement Hacking. The Cybersecurity Initiative is a joint initiative of the International Security Program and Open Technology Institute.
Hacking by law enforcement has been front page news since the
In December 2014, the FBI received a tip from a foreign law enforcement agency that a Tor Hidden Service site called “Playpen” was hosting child pornography. That tip would ultimately lead to the largest known hacking operation in U.S. law
The UK government’s approach to IT security has been roundly criticised by spending watchdog the National Audit Office (NAO).
In a report entitled Protecting Information Across Government the NAO paints a picture of a fragmenary approach to IT security
2015 was the year data breaches got personal, with identity theft the number one type of breach incidents last year.
The goal of cybersecurity is to protect data both in transit and at rest.
We are recommending a BUY
New documents confirm that a hacking group calling itself the Shadow Brokers has indeed managed to steal “cyber weapons” from the National Security Agency.
The classified top secret documents, which were published by the Intercept this morning, were leaked by
Cybersecurity governance just got a leg up in federal government.
An ongoing effort from the Obama administration to shore up the nation’s digital defenses was punctuated Sept. 8 by the creation of the first federal Chief Information Security Officer (CISO).
A proposed change to a little-known criminal procedure “would make us less safe, not more” by allowing law enforcement agencies to hack an unlimited number of computers with a single warrant, Sen. Ron Wyden said Thursday.
Wyden (D-Ore.) spoke on
“Whether it will work ultimately or not is in the implementation and we’ll probably have a good idea of that within the next year,” one expert said.
The Cybersecurity Information Sharing Act is facing an uphill battle to become a
Federal agencies seeking to stop another major hack of Americans’ personal data must establish a “zero trust” system that treats government employees as just as big a threat to cybersecurity as foreign attackers, says a report being released Wednesday by
The sole candidate for the spy chief position, Comr. Gen. Budi Gunawan, vows to improve State Intelligence Agency (BIN) performance in order to optimize the agency’s role in the protection of national security.
The National Police deputy chief said during
President Barack Obama went off the beaten track Thursday – way off – to a newly expanded marine reserve on an atoll in the middle of the Pacific Ocean, part of an effort to polish his environmental legacy.