Please turn on your JavaScript for this page to function normally.
EU flag
Cyber preparedness essential to protect EU from large scale cyber attacks

The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. Preparing …

World target
Ongoing global cyber espionage campaign broader than previously known

A detailed analysis of code and data from a command-and-control server responsible for the management of the operations, tools and tradecraft behind the Operation Sharpshooter …

USA flag
Is 2019 the year national privacy law is established in the US?

Data breaches and privacy violations are now commonplace. Unfortunately, the consequences for US companies involved can be complicated. A company’s obligation to a person …

bomb
The impact of cyber-enabled economic warfare escalation

The results of a tabletop exercise on cyber-enabled economic warfare find that when a large-scale destructive cyberattack occurs, the United States and the private sector must …

email
Email authentication use growing steadily in every industry sector

U.S. federal government agencies and many major enterprises have made significant strides to thwart the spread of fake emails, a major cybersecurity attack vector. But many …

swirl
Encryption backdoors open a Pandora’s Box for cybersecurity

The amount of encrypted traffic online has grown exponentially. This growth has occurred in the wake of the Snowden revelations, as well as the continuous stream of stories …

professional
Should government officials complete basic cyber security training?

Venafi announced the results of a survey of 515 IT security professionals’ views on the cyber security literacy of government officials. The survey was conducted August 4-9, …

Industry
Implications of the NIS Directive for the industrial sector

On July 6, 2018 the NIS (Network and Information System) Directive was enacted as the first EU-wide legislation that provides measures to boost security across the region. …

vote
Ensuring election integrity: The overlooked last mile of securing voter data

With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are …

fire
Damaging cyberattacks surge ahead of 2018 U.S. midterm elections

Carbon Black released its Quarterly Incident Response Threat Report (QIRTR) aggregating key findings from IR partner investigations during the last 90 days. Key findings …

USA flag
2018 US voter records offered for sale on hacking forum

Somebody is selling US voter registration databases on an English-language speaking dark web hacker forum and the offer comes with the promise they will be updated every week, …

cloud
Legacy government networks stifle cloud migration

67 percent of government agencies’ legacy network infrastructures are simply not prepared to handle the cloud migration lift or keep pace with the changing demands of cloud …

Don't miss

Cybersecurity news