Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

HP Awarded Contract to Enhance Assessment of Department of Defense Networks for Vulnerabilities HP today announced that the Defense Information Systems Agency (DISA) has selected HP Enterprise Services as the prime contractor for a program that will provide analytics to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as any known system vulnerabilities.

The recent move by the FCC and major cell phone carriers to create a database of stolen phones is in response to the danger your smartphone is in from thieves who want to steal and then sell them for profit. What about the hackers who just want the information from your phone – and then hope you continue using it to make financial transactions?

Adding Context Around Data Can Make a Huge Difference in How you Manage and Protect Information.Why is context important? Because without context, information is not really information; it is just data. Data is just “stuff”, while information is what that stuff means.Would you like some plain language context for my point?42.

NEW YORK, NY – Bloomberg Cybersecurity Conference -- Mentioning Pearl Harbor conjures up images of death, destruction and dread, making it a popular metaphor for conveying the devastation that could be caused by a major cyber attack. But there may be a more accurate allegory from World War II – the Japanese invasion of Singapore.

Certificate authorities (CAs) are critical links in the chain that ensures the quality and integrity of enterprise IT security, compliance and operations. CAs issue and ensure valuable third-party trust for human-to-machine and machine-to-machine communications and authentication. However, leveraging the security benefits of trust providers like CAs doesn't relieve your organization of its management responsibilities.

SAIC Plans Cybersecurity Research And Development Center In Melbourne, Australia Science Applications International Corporation (SAIC) today announced its plans to expand its current Australian operations to include a regional cybersecurity research and development (R&D) center in Melbourne, Australia.

In a packed, table filled room for about 300 people, Josh Corman and Jericho opened the SOURCE Boston conference on Tuesday with a keynote address on Anonymous. The stated goal of their talk was to examine what Anonymous could look like in 2020.

“ThreatCloud” Powers New Anti-Bot and Antivirus Software Blades, Bringing Security Intelligence and Protections to Security Gateways Network security firm Check Point Software Technologies, today announced the launch of a collaborative network designed to help its customers more effectively stop attacks and thwart cybercrime, as well as share attack information and threat trends.

Privacy advocates are pressing for an investigation into Google after a report by the Federal Communications Commission (FCC) failed to find evidence the search engine giant broke the law in collecting data through its Street View service.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

Cloud Security

Cloud security giant Wiz has raised $1 billion, which brings the total funding to $1.9 billion, at a valuation of $12 billion.