Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

After more than 20 years with the FBI, the nation’s top cyber cop has made a move to the private sector. Shawn Henry will join two former McAfee executives as President of CrowdStrike Services, a subsidiary of security startup CrowdStrike that will focus on helping organizations protect intellectual property and national security information.

In its latest operation dubbed "#OpBahrain", Anonymous supporters launched a series of DDoS attacks against web sites connected to the wildly popular Formula 1 Racing series. Included in the attacks were domains associated with the official F1 Web site, Formula1.com along with f1.com, both of which resolve to the IP address 195.219.144.30.

HP Awarded Contract to Enhance Assessment of Department of Defense Networks for Vulnerabilities HP today announced that the Defense Information Systems Agency (DISA) has selected HP Enterprise Services as the prime contractor for a program that will provide analytics to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as any known system vulnerabilities.

The recent move by the FCC and major cell phone carriers to create a database of stolen phones is in response to the danger your smartphone is in from thieves who want to steal and then sell them for profit. What about the hackers who just want the information from your phone – and then hope you continue using it to make financial transactions?

Adding Context Around Data Can Make a Huge Difference in How you Manage and Protect Information.Why is context important? Because without context, information is not really information; it is just data. Data is just “stuff”, while information is what that stuff means.Would you like some plain language context for my point?42.

NEW YORK, NY – Bloomberg Cybersecurity Conference -- Mentioning Pearl Harbor conjures up images of death, destruction and dread, making it a popular metaphor for conveying the devastation that could be caused by a major cyber attack. But there may be a more accurate allegory from World War II – the Japanese invasion of Singapore.

Certificate authorities (CAs) are critical links in the chain that ensures the quality and integrity of enterprise IT security, compliance and operations. CAs issue and ensure valuable third-party trust for human-to-machine and machine-to-machine communications and authentication. However, leveraging the security benefits of trust providers like CAs doesn't relieve your organization of its management responsibilities.

SAIC Plans Cybersecurity Research And Development Center In Melbourne, Australia Science Applications International Corporation (SAIC) today announced its plans to expand its current Australian operations to include a regional cybersecurity research and development (R&D) center in Melbourne, Australia.

In a packed, table filled room for about 300 people, Josh Corman and Jericho opened the SOURCE Boston conference on Tuesday with a keynote address on Anonymous. The stated goal of their talk was to examine what Anonymous could look like in 2020.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Financial terms were not released but the price tag is expected to be hefty with Exabeam’s most recent valuation pegged at $2.5 billion.