government
In limiting open source efforts, the government takes a costly gamble
The vast majority of companies are now realizing the value of open sourcing their software and almost all have done so for at least certain projects. These days Google, …
Top-level cyber espionage group uncovered after years of stealthy attacks
Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile …
Kazakhstan govt targeted journalists, political activists with spyware
Journalists and political activists critical of Kazakhstan’s authoritarian government, along with their family members, lawyers, and associates, have been targets of an online …
Obama defines how the US government will respond to cyber incidents
US president Barack Obama approved on Tuesday the Presidential Policy Directive on United States Cyber Incident Coordination (PPD-41). What’s the PPD-41 all about? …
Is your business still HIPAA compliant after the 2016 federal changes?
The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) warned healthcare professionals and their business associates of its intention to launch …
Law enforcement and IT security companies join forces to fight ransomware
Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab launched the No More Ransom initiative, a new step in the cooperation between law enforcement and …
Wi-Fi hack experiment conducted at Republican National Convention site
Avast security researchers conducted a Wi-Fi hack experiment at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can …
Preparing for new EU cybersecurity rules and regulations
Recently, the European Parliament signed off on its first ever set of cybersecurity rules. The Network and Information Security (NIS) Directive spells the end of more than …
StubHub fraud ringleader sentenced to state prison
Vadim Polyakov was sentenced to 4-to-12 years in state prison for coordinating an international cybercrime and money laundering scheme that involved the theft of personal …
Government IT pros overconfident in insider threat detection
An extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place …
Brexit security implications: Major, and only starting to unfold
The Brexit shock continues to reverberate throughout the global economic and policy worlds. Despite protests against the referendum’s results being cancelled due to concerns …
Top 10 strategic technologies for government in 2016
After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers