View Post

Experts call for reexamining internet protocols after global hacks

In Business, Healthcare, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , ,

Security experts say many of the world's computer systems - from voting rolls to healthcare systems - are increasingly vulnerable to hackers.While better firewalls can help, some experts are calling for a complete overhaul of internet protocols. CGTN's Frances Read has more.Watch CGTN LIVE on your computer, tablet or mobilehttp://america.cgtn.com/livenewsSubscribe to CGTN America on YouTubeFollow CGTN America:Twitter: ... Read More
View Post

The traditional CEO-CIO relationship is changing

In Business, Events, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , ,

Every year, Gartner surveys CIOs on how their jobs are changing in the digital age. The latest report – released April 6 – found that digital business has never been more top of mind for CEOs and that “CIOs should guide business leaders toward deep discipline digital business.” “The quickening pace of digitalization and technological innovation are changing the CIO role from delivery executive to business executive,” Gartner says. “To successfully lead digital transformation, CIOs must help their organizations move beyond digital experimentation and pilots and start bringing digital best practices to scale.” That means working m... Read More
View Post

The Web of Profit: A look at the cybercrime economy

In Business, Education, Government, Legal, Mobile Technology, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

Last April, I started a conversation with cybersecurity company Bromium. The company was keen to uncover where the streams of revenue generated by cybercrime eventually go and whether this money is ultimately supporting other areas of crime. Over the past 10 months, I have been examining this question, and I must say there have been some eyebrow-raising findings. While there has been a lot of research into areas such as the “cost” and the mechanisms of cybercrime, there is far less awareness and understanding of how cybercrime functions as an integrated set of criminal practices. As a result, the tech community tends to focus on technical factors, such as malware types, security holes, and how to prevent certain types of attac... Read More
View Post
Number of Items Identified: 15
Item #Item NameScoreItem Classification
1point-and-shoot camera0.6photographic equipment, camera, point-and-shoot camera
2camera0.718
3photographic equipment0.718
4loudspeaker0.716
5electrical device0.717
6charcoal color0.804

ZTE says the US export ban will “severely impact” its survival

In Business, Events, Government, Legal, Security by The VergeLeave a Comment

Tech News Keywords: , , , , ,

Chinese technology company ZTE issued a statement today in response to the US government’s banning of American exports to the company. The US Department of Commerce says ZTE didn’t uphold a plea agreement after the company pleaded guilty last year to illegally shipping US equipment to Iran and North Korea. The department specifically says the company still gave employees who acted illegally full bonuses, despite saying it wouldn’t. Additionally, only four senior staffers were fired out of the 35 who reportedly violated the law, ... Read More
View Post

Kaspersky publishes open letter revealing Twitter banned its ads

In Business, Finance, Government, Legal, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

(Reuters) — Twitter Inc. said on Friday that it has banned ads from Moscow-based Kaspersky Lab, saying the cyber-security company’s business model conflicts with advertising rules and citing U.S. government claims that Kaspersky has ties to Russian intelligence agencies. Twitter confirmed the ban in an email to Reuters after Kaspersky Lab co-founder Eugene Kaspersky disclosed the development in a blog post on Friday, saying that the company learned of the ban in early January. The ban follows charges by Washington that Kaspersky Lab has close ties to intelligence agencies in Moscow and its software could be used to enable Russian spying, which prompted the Trump administration to ban its products from U.S. gove... Read More
View Post

Why DoD is starting a new cyber cell on the Korean Peninsula

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

The Department of Defense is establishing a new cyber planning cell on the Korean Peninsula to in response to the threat from North Korea. The small team, known as a cyber operations-integrated planning elements (CO-IPE), will help better coordinate offensive and defensive cyber tools with traditional military operations. While U.S. Cyber Command is standing up cyber planning cells locally at all the combatant command headquarters, a... Read More
View Post

Taking China head on is unavoidable: Newt Gingrich

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Detected Closed Captioning: HAS NO VALIDITY, THAT WAS MANIPULATED -- NEIL: NOT TO GET INTO TOO MANY POLITICAL WEEDS HERE, THE ONE THING I ALWAYS USE AS SORT OF A PROXY ON ALL OF THIS, SPEAKER, IS WHAT THE MARKETS DO. WHEN THE MARKETS GOT WIND LATE YESTERDAY THAT ROD ROSENSTEIN HAD VISITED THE PRESIDENT AGAIN TO SAY, LOOK, YOU ARE NOT A TARGET OF THIS INVESTIGATION, SECOND TIME IN AS MANY MONTHS HE WAS ESSENTIALLY SAYING THAT -- OR THAT WAS THE MESSAGE FROM THE MUELLER CAMP -- AND THEN THE ANDY McCABE THING, THAT HE COULD BE FACING CRIMINAL CHARGES, THEY WERE DOWN ALREADY, CLOSE TO 200. BUT THEY PARED THOSE LOSSES IN HALF. AND IT FEEDS A NARRATIVE I'VE SEEN CONSISTENTLY PLAY OUT, THAT THE MARKETS -- WHATEVER YOU MIGHT THINK OF... Read More
View Post

UK teen jailed for targeting CIA chief’s phone, email

In Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

LONDON — A British teenager has been jailed for two years for compromising the email and phone accounts of senior U.S. government officials in what a judge called acts of “cyber-terrorism.” Prosecutors say that in 2015-16, Kane Gamble conned call centers into revealing information that got him into the accounts of then-FBI director Mark Giuliano, then-Secretary of Homeland Security Jeh Johnson, then-CIA chief John Brennan and other top officials. ... Read More
View Post

The privacy costs of downloading apps to your phone

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , ,

Detected Closed Captioning: CRIMINAL TARGET ONTO TRUMP. MUCH. >> THANK YOU. CHERYL: YOU MIGHT WANT TO THINK TWICE TO DOWNLOAD APP ON YOUR PHONE, THE DATA WHILE USING APPS IS NOT AS SECURE AS YOU THINK. >> HILLARY VAUGHN WENT BEHIND THE SCENES IN SECURITY CONFERENCE AND FIND OUT WHAT IT MAY COST YOU TO STAY CONNECTED. >> GOOD MORNING, CHERYL AND ADAM. MOST PEOPLE ASSUME THAT WHEN THEY DOWNLOAD AN APP FROM THE APP STORE THAT IT'S SECURED BUT THE DEPARTMENT OF HOMELAND'S SECURITY DOUGLAS TELLING ME THAT'S NOT ALWAYS THE CASE. >> MOBILE APPLICATIONS ARE PUT IN THE APP STORE, THEY ARE NOT REALLY CHECKED WHEN PEOPLE DOWNLOAD APPLICATIONS, MOST PEOPLE DON'T KNOW WHAT THEY'RE DOWNLOADING, THEY DON'T KNOW WHAT'... Read More
View Post

At RSA, sunlight is the best disinfectant for snake oil

In Business, Emerging Technology, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

As cybersecurity professionals milled about the convention floor at the RSA security conference, vendors peddled wares metaphorically doused in machine learning and artificial intelligence. At one both, a company took that formula for success to its logical end, hiring an actor complete with fake mustache and top-hat to hawk the “extract of AI in a bottle,” an overt snake-oil salesman amidst a sea of plausibly deniable snake-oil salesmen. From the exposition floor to the panel chambers, there is a pervasive sense that Machine ... Read More
View Post

At RSA, sunlight is the best disinfectant for snake oil

In Business, Emerging Technology, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

As cybersecurity professionals milled about the convention floor at the RSA security conference, vendors peddled wares metaphorically doused in machine learning and artificial intelligence. At one both, a company took that formula for success to its logical end, hiring an actor complete with fake mustache and top-hat to hawk the “extract of AI in a bottle,” an overt snake-oil salesman amidst a sea of plausibly deniable snake-oil salesmen. From the exposition floor to the panel chambers, there is a pervasive sense that Machine ... Read More
View Post

Future cyber threats will come from inside the architecture

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

New attacks, snake oil and pingpong: RSA Wednesday round-up Kelsey and Daniel round up the day's happenings at the RSA conference in San Francisco. “The Five Most Dangerous Attack Techniques” read the marquee guiding attendees of the RSA cybersecurity conference to this morning’s keynote panel. As the audience shuffled to find seats in the bluely lit room, the four panelists from SANS institute launched into a rapid fire assessment of multiple threats, some of which certainly seemed dangerous. ... Read More
View Post

House Democrats want war authorization repeal, but path is unclear

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — Democrats are in wide agreement the post-2001 war authorizations should be repealed, House Minority Leader Nancy Pelosi said Thursday. But what to replace it with opens up a tough conversation about where the military should be be used, and where it shouldn’t. House Armed Services Committee’s top Democrat, Rep. Adam Smith, of Washington, said as much in a ... Read More
View Post

Microsoft puts sexiness ahead of security: Ex-CIA cyber officer

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , , , , ,

Detected Closed Captioning: STUART: I WANT TO HEAR MORE ABOUT THIS DIET. THANKS FOR BEING WITH US SPREAD WE APPRECIATE IT. THE UNITED STATES AND THE UNITED KINGDOM RECENTLY BLAMED RUSSIA FOR A NUMBER OF CYBER ATTACKS. HILLARY IS AT THE CYBER WEEK EVENT IN SAN FRANCISCO. HILLARY, COME IN PART ONE OF THE TOPICS IS HOW TO SECURE AMERICA FROM CYBER TERRORISM. WHAT THEY ACTUALLY DOING? PLEASE DON'T TELL ME THEY'RE LOOKING AT THIS IN LOOKING AT THAT. WHAT ARE THEY DOING? >> RIGHT NOW THEY ARE BUILDING US A LOT OF DEFENSES, MAINLY FOCUSING ON THE INTERNET OF THINGS. ALL THESE CONNECTED DEVICES THAT WE HAVE IN OUR HOMES THAT ARE VULNERABLE TO THESE HACKERS BECAUSE A LOT OF PEOPLE DON'T HAVE THE SECURITY THEY NEED IN THEIR HOME.... Read More
View Post

After Alert On Russian Hacks, Bigger Push To Protect Power Grid

In Business, Education, Energy, Events, Finance, Government, Science & Nature, Security by National Public RadioLeave a Comment

Tech News Keywords: , , , , , , , , ,

In the control room of PJM Interconnection, employees monitor a power grid that stretches across the Midwest and Mid-Atlantic. PJM Interconnection hide caption toggle caption PJM Interconnection The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastru... Read More
View Post

NHS website defaced by hackers

In Security by BBCLeave a Comment

Tech News Keywords: ,

An NHS website hosting data from patient surveys that was defaced by hackers has been fixed. The site, insights.london.nhs.uk, was given a black background, eerie music and a message in white text that read: "Hacked by AnoaGhost."Cyber-security expert Kevin Beaumont spotted the defacement and tweeted a screenshot of it to his followers on Tuesday afternoon.A few hours later, the message was removed.The site in question hosts data from sources such as patient surveys... Read More
View Post

If you want to know how we ended up in a cyber dystopia, read Ready Player One

In Business, Education, Events, Government, Legal, Science & Nature, Security, Start Up by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

When Ernest Cline’s Ready Player One was published in 2011, the reviews were ecstatic, beatific. It was an “enchanting,” “accessible” “... Read More
View Post

Ikea’s TaskRabbit app back online after data breach

In Government, Legal, Security by BBCLeave a Comment

Tech News Keywords: , ,

Ikea's odd jobs marketplace TaskRabbit is back online, following a "cyber-security incident" on Monday.TaskRabbit lets people find freelance workers to complete household tasks such as cleaning, gardening or assembling flat-pack furniture.The company says an "unauthorised user gained access to our systems" and "certain personally identifiable information may have been compromised".It pledged to notify any customer who had their data accessed in the attack.The TaskRabbit app and website were closed on Monday and Tuesday. And the company said it was working with law enforcement and a cy... Read More
View Post

Future cyber threats will come from inside the architecture

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

“The Five Most Dangerous Attack Techniques” read the marquee guiding attendees of the RSA cybersecurity conference to this morning’s keynote panel. As the audience shuffled to find seats in the bluely lit room, the four panelists from SANS institute launched into a rapid fire assessment of multiple threats, some of which certainly seemed dangerous. Alan Paller, research director and founder of SANS Institute, together with SANS instructor Ed Skoudis, SANS Dean of Research Johannes Ullrich, and SANS Head of R&D James Lyne... Read More
View Post

With proposed cuts, what happens to DISA’s mission?

In Business, Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , ,

Under new proposed legislation introduced April 17, House Armed Services Committee Chairman Mac Thornberry targeted the Defense Information Systems Agency for elimination as part of a search for efficiencies military-wide. But it remains unclear what would happen to DISA’s missions and functions if the measures were enacted. As it turns out, that question was never completely answered in previous efficiency-hunt... Read More
View Post

RSA founders wrestle with how governments might use blockchain

In Emerging Technology, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , ,

At the penultimate opening keynote at the encryption technology conference named after the company and technology he co-founded, Ronald Rivest admitted that his cryptography panel had something of a name problem. Rivest, who together with his co-panelist Adi Shamir helped establish the RSA system and a standard for public-key encryption, wanted to remind attendees, that “crypto is for cryptographers, and there should be something else for the cryptocurrency people.” ... Read More
View Post

Should Congress treat Facebook like the Exxon Valdez?

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

“In many ways Facebook is the Exxon of our time,” Signal founder Moxie Marlinspike said at the RSA Cryptographers’ panel April 17. There may have been a time where the assembled crowd of cybersecurity industry professionals, assembled in auditoriums and overflow rooms in San Francisco’s Moscone Center, may have objected to the characterization of the tech giant as a sloppy disastrous behemoth, but that time is not 2018. Marli... Read More
View Post

Russia denies ‘feeble’ US, UK charges of internet tampering

In Business, Government, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Russia denied accusations from the United States and Britain that its agents have planted malware on key components of the internet to spy on rivals, steal trade and potentially launch cyberattacks. A Kremlin spokesman on Tuesday called the claim unfounded and “feeble.” In a joint statement Monday, the U.S. Department of Homeland Security, the FBI and the U.K.’s National Cyber Security Centre said the main targets in the allege... Read More
View Post

IT tops governmentwide list of agency management challenges

In Finance, Government, Legal, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

In the first ever comprehensive list of the management and performance challenges faced by agencies across the entire government, information technology security and management was the number one problem reported in 2017. “Agencies need reliable and secure IT systems to perform their mission-critical functions. Yet across government, we identified problems in key areas, including the protection of sensitive data and information systems from cyber attacks, modernizing and managing IT systems, ensuring continuity of operations an... Read More
View Post

Saviynt Announces $40 Million Series A Funding Round with Carrick Capital Partners

In Business, Events, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , ,

Capital to Further Fuel Saviynt’s Impressive Growth, Continue To Scale Go-To-Market Operations, Expand Channel Partner Ecosystem, and Extend Product Capabilities SAN FRANCISCO–(BUSINESS WIRE)–April 18, 2018– Saviynt, a leading global provider of Identity Governance and Administration (IGA) solutions, announced today that ... Read More
View Post

Tech firms sign Cybersecurity Tech Accord, big names missing

In Business, Government, Security by The StackLeave a Comment

Tech News Keywords: , , , , , , , ,

Facebook, Microsoft and 32 other major technology companies have signed a Cybersecurity Tech Accord to protect people from cybercrime. The agreement makes a number of promises that the signatories hope will protect consumers and businesses from an ever-growing wave of cybercrime. This includes refusing to collaborate with governments on cyberattacks. Cynics reading may note some fairly large omissions from the list, such as Apple, Amazon, Google and Twitter. They may also consider the inclusion of Facebook to be somewhat incongruous given its recent troubles. The companies that are involved, which includes major players in technology and secur... Read More
View Post

John Peterson talks future of cybersecurity at businesses

In Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Detected Closed Captioning: And Startups Are Also Playing A Big Part And Startups Are Also Playing A Big Part And Startups Are Also Playing A Big Part in The Security Industry And We Have One in The Security Industry And We Have One in The Security Industry And We Have One that Just Came Out Of Stealth Mode With that Just Came Out Of Stealth Mode With that Just Came Out Of Stealth Mode With Us Here Eila Data We Have John Peterson Us Here Eila Data We Have John Peterson Us Here Eila Data We Have John Peterson The Chief Product Officer First Of All the Chief Product Officer First Of All the Chief Product Officer First Of All Tell Us Cyber Crime Is On The Rise But Tell Us Cyber Crime Is On The Rise But Tell Us Cyber Crime... Read More
View Post

Top cybersecurity experts & business leaders gather at RSA conference

In Business, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , , , , ,

Published on Apr 17, 2018The world's top cybersecurity experts and business leaders have descended in San Francisco to discuss emerging threats and how to counter them. RSA conference is one of the leading information security events. CGTN's Mark Niu reports. Category License Standard YouTube Li... Read More
View Post

Russia’s new cyber threat exploits home devices

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , , ,

Tech Republic senior reporter Dan Patterson joins CBSN with details of an emerging cyber threat. U.S. and U.K. officials warn that Russian hackers are targetting home and business routers and IoT (internet of things) devices like FitBit, Alexa or "smart" appliances. The ultimate goal may be to attack to more complex systems like power grids and water filtration systems.Subscribe to the CBS News Channel HERE: http://youtube.com/cbsnewsWatch CBSN live HERE: ... Read More
View Post

Russia’s new cyber threat exploits home devices

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , , ,

Tech Republic senior reporter Dan Patterson joins CBSN with details of an emerging cyber threat. U.S. and U.K. officials warn that Russian hackers are targetting home and business routers and IoT (internet of things) devices like FitBit, Alexa or "smart" appliances. The ultimate goal may be to attack to more complex systems like power grids and water filtration systems.Subscribe to the CBS News Channel HERE: http://youtube.com/cbsnewsWatch CBSN live HERE: ... Read More
View Post

Ikea app TaskRabbit reveals security breach

In Government, Legal, Security by BBCLeave a Comment

Tech News Keywords: , ,

Ikea's odd jobs marketplace TaskRabbit is investigating a "cyber-security incident", the company has announced.The app and website let people find freelance workers to complete household tasks such as cleaning, gardening or assembling flat-pack furniture.TaskRabbit has not revealed the nature of the incident, but said it was working with law enforcement and a cyber-security firm to investigate.The app and website have been temporarily closed.The UK's information commissioner's office said it was "aware of a potential data breach" and was "looking into" the situation.The company has ... Read More
View Post

US, UK say Russia targets internet hardware for espionage

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

Washington and London on Monday jointly accused the Russian government of maliciously targeting global internet equipment for political and economic espionage. The two governments said the Russian operations, which allegedly involve planting malware on internet routers and other equipment, could also lay the foundation for future offensive cyberattacks. A joint statement by the U.S. Department of Homeland Security, the FBI and the U.... Read More
View Post

US, UK Warn of Russian Cyberattacks

In Security, Video by NewsBeat SocialLeave a Comment

Tech News Keywords: , , , , , , ,

Published on Apr 17, 2018On April 16, the United States and United Kingdom issued a first-of-its-kind joint statement warning of Russian cyberattacks against public and private sector organizations. Category License Standard YouTube License Det... Read More
View Post

How Obama’s drone playbook could influence future cyber operations

In Education, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

The head of U.S. Cyber Command, Adm. Michael Rogers, indicated that Department of Defense leaders are discussing the possibility of U.S. military cyber operations in nations where the United States is not actively involved in a conflict. During testimony April 11 before the House Armed Services subcommittee on emerging threats and capabilities, Rogers explained he is comfortable with his authorities to use offensive cyber tactics in Iraq, Syria and Afghanistan. ... Read More
View Post

#2TalkAbout For April 17, 2018

In Video by CBS New YorkLeave a Comment

Tech News Keywords: , , , , , ,

Detected Closed Captioning: Good Morning It's April 17th I'm Alex Good Morning It's April 17th I'm Alex Good Morning It's April 17th I'm Alex Ennis And Here's Some Topics To Talk Ennis And Here's Some Topics To Talk Ennis And Here's Some Topics To Talk about Today US Officials Are Warning about Today US Officials Are Warning about Today US Officials Are Warning About A Potential Cyber Attack They Say About A Potential Cyber Attack They Say About A Potential Cyber Attack They Say That Russian Spies Are Attempting To That Russian Spies Are Attempting To That Russian Spies Are Attempting To hack Into Millions Of Devices That Use hack Into Millions Of Devices That Use hack Into Millions Of Devices That Use Internet Routers S... Read More
View Post

Understanding the players, tactics for a possible war in space

In Business, Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

A war in space will look nothing like Star Wars. It will look nothing like Star Trek, or Independence Day, or any familiar trope. To control the heavens, to contest space, nations will launch missiles at satellites and, to paraphrase Tacitus, create a debris field and call it peace. This rough approximation, a nightmare of explosions and permanent orbital shrapnel, only maps out the end state, should the long accepted neutrality of orbit get lost into the inertia of war. To map the particulars of a stand-off over space, the Secure World Foundation released a report this week on Global Counterspace Capabilities, an open-source a... Read More
View Post

Major bill aims to slash Pentagon bureaucracy

In Business, Government, Healthcare, Legal, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — The chairman of the House Armed Services Committee has targeted most Pentagon support agencies for a 25 percent cut, proposing seven be shuttered entirely. If adopted, it could lead to thousands of defense civilian job cuts and massive changes for defense contractors. Texas Republican Rep. ... Read More
View Post

NIST publishes update to its cyber framework

In Business, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

The new version 1.1 of the Cybersecurity Framework, which was developed through public feedback collected in 2016 and 2017, includes updates to authentication and identity, self-assessing cyber risk, managing cybersecurity within the supply chain and vulnerability disclosure. “This update refines, clarifies and enhances version 1.0,” said Matt Barrett, program manager fo... Read More
View Post

Another time: US scraps new sanctions against Russia after series of threats

In Business, Government, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

In the wake of the alleged chemical attack in Syria, the Trump administration has repeatedly promised to punish Damascus' ally, Russia with new sanctions. However, on Monday it said they'd been put on hold. READ MORE: https://on.rt.com/93fqCheck out ... Read More
View Post

Another time: US scraps new sanctions against Russia after series of threats

In Business, Government, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

In the wake of the alleged chemical attack in Syria, the Trump administration has repeatedly promised to punish Damascus' ally, Russia with new sanctions. However, on Monday it said they'd been put on hold. READ MORE: https://on.rt.com/93fqCheck out ... Read More
View Post

Facebook, Microsoft, and 32 other tech firms sign cybersecurity pledge

In Business, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , ,

Facebook, Microsoft, and 32 other technology companies have pledged to protect their customers from cyberattacks as part of a commitment to not help governments advance their cyber warfare efforts. The Cybersecurity Tech Accord is touted as a “watershed agreement” by the signatories and comes after a wave of high-profile cyberattacks over the past year. The list of companies includes: ABB, Arm, Avast, Bitdefender, BT, CA Technologies, Cisco, Cloudflare, DataStax, Dell, DocuSign, Facebook, Fastly, FireEye, F-Secure, GitHub, Guardtime, HP ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1try square0.831tool, square, try square
2square0.874
3tool0.874
4memory device0.795

The White House Warns on Russian Router Hacking, But Muddles the Message

In Business, Education, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

For its first year in office, the Trump administration seemed soft on Russia's hyper-aggressive hackers, reluctant even to point out they'd brazenly meddled in the US election. Then, just two months ago, the White House suddenly came out swinging, calling out Russia for its massively disruptive NotPetya malware and intrusions into the US power grid, and imposing new sanctions in response. Now, in its latest warning to Russia over its hacking bonanza, the White House may have confused the message again, this time in t... Read More
View Post

The White House Loses Rob Joyce and Tom Bossert, Its Cybersecurity Brain Trust

In Business, Education, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Today, the White House confirmed that cybersecurity coordinator Rob Joyce will head back to the National Security Agency, where he previously ran the nation’s top hacking team. His departure comes just a week after Tom Bossert, Trump’s cybersecurity czar and Joyce’s boss, was forced out—and leaves the administration without two trusted voices on one of the most important challenges the US faces going forward. While Bossert’s exit appears to have been engineered by recently installed national security advisor John Bolton, Reuters ... Read More
View Post

The White House Loses Rob Joyce and Tom Bossert, Its Cybersecurity Brain Trust

In Business, Education, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Today, the White House confirmed that cybersecurity coordinator Rob Joyce will head back to the National Security Agency, where he previously ran the nation’s top hacking team. His departure comes just a week after Tom Bossert, Trump’s cybersecurity czar and Joyce’s boss, was forced out—and leaves the administration without two trusted voices on one of the most important challenges the US faces going forward. While Bossert’s exit appears to have been engineered by recently installed national security advisor John Bolton, Reuters ... Read More
View Post

The White House Loses Rob Joyce and Tom Bossert, Its Cybersecurity Brain Trust

In Business, Education, Government, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Today, the White House confirmed that cybersecurity coordinator Rob Joyce will head back to the National Security Agency, where he previously ran the nation’s top hacking team. His departure comes just a week after Tom Bossert, Trump’s cybersecurity czar and Joyce’s boss, was forced out—and leaves the administration without two trusted voices on one of the most important challenges the US faces going forward. While Bossert’s exit appears to have been engineered by recently installed national security advisor John Bolton, Reuters ... Read More
View Post

Young ‘Cyber Ninja’ Exposes Risks On Internet Networks

In Events, Government, Security, Video by CBS New YorkLeave a Comment

Tech News Keywords: , , ,

Published on Apr 16, 2018Reuben Paul is a sixth grader from Austin and a self-proclaimed "Cyber Ninja" who speaks at conferences to expose hacking risks. CBS News' David Begnaud reports. Category License Standard YouTube License Detected Closed... Read More
View Post

White House loses cyber coordinator amid adviser exodus

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , ,

White House cyber coordinator Rob Joyce will be leaving his role in the administration and returning to the National Security Agency, where he worked prior to his advisory role, Reuters reported April 16, 2018. The announcement comes on the heels of Joyce’s boss Tom Bossert’s April 10 departure as homeland security adviser and Lt. Gen. H.R. McMaster’s April 6 ... Read More
View Post

Russian hackers mass exploit routers in homes, govs, and infrastructure

In Business, Events, Government, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , ,

EnlargeUS Air Force Hackers working on behalf of the Russian government are compromising large numbers of routers, switches, and other network devices belonging to governments, businesses, and critical-infrastructure providers, US and UK officials warned Monday. The Russian government-sponsored actors are using the compromised devices to perform man-in-the-middle attacks that ext... Read More
View Post

Department of Commerce bans U.S. firms from selling to ZTE for 7 years

In Business, Events, Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , ,

(Reuters) — The U.S. Department of Commerce has banned American companies from selling components to leading Chinese telecom equipment maker ZTE for seven years for violating the terms of a sanctions violation case, U.S. officials said on Monday. The U.S. action, first reported by Reuters, could be devastating to ZTE since American companies are estimated to provide 25 percent to 30 percent of the components used in ZTE’s equipment, which includes networking gear and smartphones. The ban is the result of ZTE’s failure to comply with an agreement with the U.S. government afte... Read More
View Post

Pentagon creates new position to help guide software acquisition, F-35 development

In Business, Education, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , ,

WASHINGTON — The U.S. Defense Department is creating a new position to help formulate its software strategy and ensure it keeps pace with commercial advancements — and the most important resposiblity will be overseeing the F-35 joint strike fighter’s agile software strategy. During a Friday roundtable with reporters, Ellen Lord, the undersecretary of defense f... Read More
View Post

Russia accused of global net hack attacks

In Business, Events, Government, Security by BBCLeave a Comment

Tech News Keywords: , , , , ,

State-sponsored Russian hackers are actively seeking to hijack essential internet hardware, US and UK intelligence agencies say.The UK's National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security issued a joint alert warning of a global campaign.The alert details methods used to take over essential network hardware. The attacks could be an attempt by Russia to gain a foothold for use in a future offensive, it said."Russia is our most capable hostile adversary in cyber-space, so dealing with their attacks is a major priority for the National Cyber Securit... Read More
View Post

OCX at an ‘inflection point’, says Pentagon’s top weapons buyer

In Business, Finance, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , ,

COLORADO SPRINGS, Colo. — The Air Force’s ever-late and overly expensive next-generation GPS control station has been a headache for years, but the Pentagon’s top weapons buyer says there is reason to believe the program is leaving its troubled past behind. ... Read More
View Post

ZTE can no longer buy Qualcomm chips after US ban

In Business, Events, Government, Legal, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

The US Department of Commerce just announced a ban on American exports to the Chinese smartphone maker ZTE. That means American companies like Dolby and Qualcomm won’t be able to export any parts to ZTE for up to seven years. The loss of Qualcomm is particularly damaging, as it severely restricts ZTE’s options for devices in the US market. The Commerce Department says ZTE failed to uphold a plea agreement after it pleaded guilty last year to illegally shipping US... Read More
View Post

OCX at an ‘inflection point’, says Pentagon’s top weapons buyer

In Business, Finance, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , ,

COLORADO SPRINGS, Colo. — The Air Force’s ever-late and overly expensive next-generation GPS control station has been a headache for years, but the Pentagon’s top weapons buyer says there is reason to believe the program is leaving its troubled past behind. ... Read More
View Post

China’s ZTE ‘poses risk to UK security’

In Business, Government, Security by BBCLeave a Comment

Tech News Keywords: , , , , , ,

The UK's cyber-defence watchdog has confirmed it has blacklisted one of China's leading state-owned companies.The National Cyber Security Centre (NCSC) has written to UK telecoms providers warning them that the use of ZTE's equipment and services could pose a national security risk.The move coincides with a US government ban preventing American businesses from selling components to the Shenzhen-based company.ZTE has yet to respond to the moves."It is entirely appropriate and part of NCSC's duty to highlight potential risks to the UK's national security and provide advice based on our ... Read More
View Post

Cyber security imperative

In Business, Finance, Government, Healthcare, Legal, Science & Nature, Security by Long Island Business NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Workers at BNB, a Bridgehampton-based bank, periodically get suspicious emails. But it’s not because they slip through the fire walls. BNB tests employees, making sure they don’t click on “fake phishing” emails that, if they were real, could compromise data. AGIM BRACOVIC: A culture of care is key in promoting cyber security “That’s one of the biggest challenges in cyber. Starting with culture is important,” said Agim Bracovic, BNB Bank’s vice president, information security officer. “We train our employees, but we also test them. We send fake phishing emails and see if they’re clicking.” Until recently,... Read More
View Post

Cybersecurity engineering: A new academic discipline

In Business, Education, Events, Government, Healthcare, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

Cyber startups and legacy technology companies know exactly how to attract top undergraduates: a six-figure salary, a signing bonus, even a new car. With these luxuries in reach, choosing to forgo the job offer in pursuit of advanced higher education seems irrational for most new grads. However, this is exactly what’s being asked of them by the cybersecurity industry — an industry with zero unemployment and a severe skills shortage in both private sector employment and higher education. With 3.5 million cybersecurity jobs expected to open by 2021, employers will continue to seek out prospective job candidates from technical schoo... Read More
View Post

India’s ‘Aadhaar’ database and challenges of reporting it | The Listening Post

In Business, Events, Government, Legal, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , , , ,

In January 2018, a local paper in the western Indian state of Punjab, The Tribune, published an article revealing that the private details of millions of Indians - gathered under the Aadhaar scheme - could be bought, cheap.Aadhaar, a nationwide identity programme that is run by the Indian government, is the world's largest biometric identification system. The programme is the keystone in an ambitious plan to digitise India's economy and to make the distribution of state welfare more efficient.It took over a decade to design and roll out, and more than 1.2 billion Indians have already signed up to it. But it's been dogged by legal challenges and questions over privacy.Despite news reports... Read More
View Post

EPA, FBI and DHS get new senior leadership

In Business, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

Federal agencies saw a series of leadership positions confirmed and announced, especially in IT roles. Controversial EPA nominee confirmed The Senate voted 53 to 45 to confirm Andrew Wheeler to be deputy administrator at the Environmental Protection Agency April 12, 2018. Wheeler was nominated to the position in October... Read More
View Post

🇵🇰 Geo goes dark: Media and the military in Pakistan: The Listening Post (Full)

In Business, Education, Government, Legal, Security, Video by Al Jazeera EnglishLeave a Comment

Tech News Keywords: , , , , , , , ,

On The Listening Post this week: Media mystery in Pakistan - who ordered Geo News off the air and why? Plus, the challenges of covering the world's largest biometric database.Why did Pakistan's Geo TV go dark?Pakistan's most-watched broadcast network Geo TV has been off the air for more than a month across much of the country and no one in a position of authority is saying why.Government ministers and the broadcasting regulator have denied any involvement and the cable companies that pulled the plug on Geo are staying silent. As is the Pakistani military, which has butted heads with Geo before and is suspected by numerous political and media observers as having ordered the blackout.... Read More
View Post

What the Hoover Dam shows about hardening critical infrastructure

In Business, Education, Energy, Government, Healthcare, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

Cybersecurity is often discussed in terms of mission-critical information in far-off databases or personal information stored on handheld devices, but what about the cybersecurity of bridges, power plants and dams? Securing old-school infrastructure against cyber attacks is critical now that they rely on digital interfacing for day-to-day operations, experts and government officials say. Power plants, drinking water facilities and even oil pipelines rely on strong cybersecurity to prevent service outages. While experts say the U.S... Read More
View Post

EPA, FBI and DHS get new senior leadership

In Business, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

Federal agencies saw a series of leadership positions confirmed and announced, especially in IT roles. Controversial EPA nominee confirmed The Senate voted 53 to 45 to confirm Andrew Wheeler to be deputy administrator at the Environmental Protection Agency April 12, 2018. Wheeler was nominated to the position in October... Read More
View Post

EPA, FBI and DHS get new senior leadership

In Business, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

Federal agencies saw a series of leadership positions confirmed and announced, especially in IT roles. Controversial EPA nominee confirmed The Senate voted 53 to 45 to confirm Andrew Wheeler to be deputy administrator at the Environmental Protection Agency April 12, 2018. Wheeler was nominated to the position in October... Read More
View Post

Pompeo vows to confront Russia, dodges Mueller questions

In Business, Government, Legal, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — Aiming to quell concerns before what is likely to be a narrow confirmation vote, Secretary of State-designate Mike Pompeo vowed on Thursday to ramp up efforts against Russia in “each place we confront them.” But he ducked and dodged when asked whether he supports President Donald Trump’s pounding criticism of the federal investigation into Russian meddling in the 2016 election. Pompeo, now Trump’s CIA chief, tread carefully when confronted with several of the president’s controversial and undiplomatic stat... Read More
View Post

EPA, FBI and DHS get new senior leadership

In Business, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

This week, federal agencies saw a series of leadership positions confirmed and announced, especially in IT roles. Controversial EPA nominee confirmed The Senate voted 53 to 45 to confirm Andrew Wheeler to be deputy administrator at the Environmental Protection Agency April 12, 2018. Wheeler was nominated to the position... Read More
View Post

EPA, FBI and DHS get new senior leadership

In Business, Government, Science & Nature, Security by Federal TimesLeave a Comment

Tech News Keywords: , , , , ,

This week, federal agencies saw a series of leadership positions confirmed and announced, especially in IT roles. Controversial EPA nominee confirmed The Senate voted 53 to 45 to confirm Andrew Wheeler to be deputy administrator at the Environmental Protection Agency April 12, 2018. Wheeler was nominated to the position... Read More
View Post

Venture Atlanta Announces Dave DeWalt as Keynote Speaker, Opens 2018 Conference Registration

In Business, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , ,

Top Silicon Valley CEO of FireEye, McAfee and Documentum to Share Insights on Building Top Tech Companies ATLANTA–(BUSINESS WIRE)–April 13, 2018– With online registration now open for the Southeast’s premier venture conference, Venture Atlanta announced today that Dave DeWalt will deliver the opening keynote at this year’s conference. DeWalt is a Silicon Valley-based cyber security icon having lead innovative software companies such as FireEye and McAfee, resulting in billions in new revenue and thousands of new jobs. DeWalt is currently managing director of AllegisCyber as well as a director of various corporate boards including Delta Airlines, ForgeRock, ForeScou... Read More
View Post

A test of patients: the challenges of healthcare IT

In Business, Events, Government, Healthcare, Legal, Science & Nature, Security by The StackLeave a Comment

Tech News Keywords: , , , , ,

Ahead of his session at Data Centre World Asia, held in Hong Kong this May, Sylvester Wong, Senior Director IT at Fresenius Medical Care (FMC), spoke to The Stack about the challenges of IT requirements in healthcare, and his expectations for the industry in the future. Working in healthcare IT provides a unique set of challenges. Unlike many other typical IT departments, the decisions made in the healthcare sector directly affect patient wellbeing. This adds an additional level of pressure and reliance on the IT team that isn’t typically seen in other organisations. IT regulations in healthcare As well as this, the healthcare sector is highly sensitive and regulated. As such, Wong argues that ... Read More
View Post

Pentagon creates new position to help guide software acqusition, F-35 development

In Business, Education, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , ,

WASHINGTON — The Defense Department is creating a new position to help formulate its software strategy and ensure that the Pentagon keeps pace with commercial advancements — and his most important job will be overseeing the F-35 joint strike fighter’s agile software strategy. During a Friday roundtable with reporters, Ellen Lord, the undersecretary of defense ... Read More
View Post

‘We’re exceptional, Russia is not’: Meet Trump’s pick for the head of American diplomacy

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , , , , , , , ,

Facing widespread opposition from Democrats over his political beliefs, Mike Pompeo, President Donald Trump’s nominee to take over the State Department, took a hard line on Russia in his confirmation hearing.Pompeo described Russia as “a danger to our country” and blamed Russian President Vladimir Putin for any “bad blood” between Washington and Moscow. He also vowed to “confront [the Russians] at every vector, cyber, economic, et cetera. We need to make sure Putin doesn’t succeed.” READ MORE: ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1stock trader0.755person, stock trader
2person0.892
3coal black color0.911
4black color0.732

Facebook CEO Mark Zuckerberg says he would be open to the “right kind” of regulation

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , , , , ,

During his testimony on Capitol Hill, Facebook CEO Mark Zuckerberg said he would be open to "the right kind" of regulation. Anthony Dagostino, the Global Head of Cyber Risk at Willis Towers Watson, discusses what possible U.S. government regulation could look like, the steps the European Union is taking to protect data -- and why companies need to "wake up" when it comes to privacy protections.Subscribe to the CBS News Channel HERE: http://youtube.com/cbsnewsWatch CBSN live HERE: ... Read More
View Post

Are MARSOC cyber operators on the horizon?

In Education, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: ,

Cyber operations may not be the first thing that come to mind when thinking of elite special operators on a high-speed mission ― but with rising tech threats across the globe, Marine Raiders are looking to put cyber sleuths near the front lines. Packing capabilities that can aid in physical effects on enemy forces or help ... Read More
View Post

Investors welcome regulations on bitcoin: Gasparino

In Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , ,

Detected Closed Captioning: TO STOCKS EQUAL ONE THIRD OF THE DOW GAIN IN THE FINAL 14 MINUTES OF TRADE. BOWING ON POSITIVE FEELINGS THAT WE MAY READ JOINED THE TPP AND GOLDMAN SACHS EARNING POSITIVITY AHEAD OF TOMORROW'S REPORT. BIG COIN SURGING 11% AFTER BOTTOMING OUT YESTERDAY. RIGHT NOW WE ARE JUST ABOVE 7000. IT COIN AT 7685. THAT'S UP $739. THIS AFTER CHARLIE BROKE NEWS THAT NORMALLY WE WOULD HAVE THOUGHT WOULD HAVE BEEN NEGATIVE AND THAT WAS THAT THE SEC WAS GOING TO GO AFTER THE BAD ACTORS IN THE COIN. >> ) I JUST WANT TO SAY CRYPTO CURRENCY IN THE TRUMP VOICE. CRYPTO CURRENCY. THIS IS WHAT HAPPENED. IT WAS INTERESTING BECAUSE I THOUGHT BIG COIN WOULD GO DOWN AFTER THE REPORT. >> I GOT A BUNCH OF CALLS FROM... Read More
View Post

Cyber Command has a role, but Pentagon leaders struggle to define it

In Government, Legal, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , ,

Nearly a decade after the formation of U.S. Cyber Command senior leaders at the Department of Defense are questioning the scope of the organization’s work due to the novelty of formalized military cyber operations and the dynamic cyber environment. In other words: where does Cyber Command’s work begin and end? “The challenge associated with defining traditional military activities in the cyber domain is typically that is done b... Read More
View Post

New threats mean new training for the Navy

In Business, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , ,

In a bit to boost readiness in the realm of information warfare, the Navy is cementing training focused on next-generation threats and missions. The Navy’s Information Warfare Training Group, located in Norfolk, Virginia, aims to provide sailors with beginner and intermediate training in cyber, electronic warfare, cryptology, intelligence, communications, meteorology and oceanography and space. Advanced training will take place at ... Read More
View Post

Cyber Command has a role, but Pentagon leaders struggle to define it

In Government, Legal, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

Nearly a decade after the formation of U.S. Cyber Command senior leaders at the Department of Defense are questioning the scope of the organization’s work due to the novelty of formalized military cyber operations and the dynamic cyber environment. In other words: where does Cyber Command’s work begin and end? “The challenge associated with defining traditional military activities in the cyber domain is typically that is done b... Read More
View Post

Key issues in Mike Pompeo’s confirmation hearing

In Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , ,

CIA Director Mike Pompeo's confirmation hearing for Secretary of State is likely to focus on global hotspots like Iran, Russia and North Korea. Norman Roule, an expert at The Cyber Brief, former CIA Middle East operations manager and national intelligence manager for Iran, joined CBSN with insights into Pompeo's background and the role it could play in foreign policy if he is confirmed.No Closed Captioning Detected within this Video.... Read More
View Post

The Pentagon is getting serious about AI weapons

In Business, Education, Emerging Technology, Government, Legal, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

Aerospace engineer Mike Griffin says he is taking the threat of drone swarms — including those that could be driven by artificial intelligence — seriously. So is his employer, the US Department of Defense, as are top officials in the US Air Force. The threat is no longer theoretical. During an April 9th Washington, DC conference on the future of war sponsored by the nonprofit think tank New America, Griffin, a former space program director, who in February became the undersecretary of defense for research and engineering, noted that a small swarm of drones ... Read More
View Post

UK carries out cyber-attack on Islamic State

In Government, Security by BBCLeave a Comment

Tech News Keywords: , , ,

The UK has conducted a "major offensive cyber-campaign" against the Islamic State group, the director of the intelligence agency GCHQ has revealed.The operation hindered the group's ability to coordinate attacks and suppressed their propaganda, former MI5 agent Jeremy Fleming said. It is the first time the UK has systematically degraded an adversary's online efforts in a military campaign.Mr Fleming made the remarks in his first public speech as GCHQ director."The outcomes of these operations are wide ranging," he told the Cyber UK conference in Manchester."In 2017 there were times ... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1musician0.665person, musician
2person0.761
3indigo color0.911
4ultramarine color0.883

Why the Navy wants more of these hard-to-find software developers

In Business, Government, Science & Nature, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , ,

With a relative dearth of cyber expertise in the military, Congress mandated last year the services begin direct commissioning pilot programs. The Navy, however has been doing direct commissioning for highly skilled software engineers for a few years, albeit on a small scale. The cyber warfare engineer (CWE) program is a highly competitive, self-selecti... Read More
View Post

Why the Navy wants more of these hard-to-find software developers

In Business, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , ,

With a relative dearth of cyber expertise in the military, Congress mandated last year the services begin direct commissioning pilot programs. The Navy, however has been doing direct commissioning for highly skilled software engineers for a few years, albeit on a small scale. The cyber warfare engineer (CWE) program is a highly competitive, self-selecti... Read More
View Post

Why the Navy wants more of these hard-to-find software developers

In Business, Government, Science & Nature, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , ,

With a relative dearth of cyber expertise in the military, Congress mandated last year the services begin direct commissioning pilot programs. The Navy, however has been doing direct commissioning for highly skilled software engineers for a few years, albeit on a small scale. The cyber warfare engineer (CWE) program is a highly competitive, self-selecti... Read More
View Post

TRANSCOM eyes future with autonomous trucks, ships and planes

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , ,

Air Force Gen. Darren McDew, chief of U.S. Transportation Command, is striking a precarious balance between partnering with industry and ensuring the cybersecurity of systems critical to military transportation operations. But he’s also looking toward the future. TRANSCOM, like the rest of the military, is heavily reliant contractors in virtually every facet of day-to-day functions. But even as leaders from across the Department of Defense call for improvements in industry partnerships, cybersecurity remains a sticking point.... Read More
View Post

A new target for hackers? Satellites

In Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

WASHINGTON – Government and commercial satellite operators are increasingly the target of hackers, who are looking for inexpensive, but effective ways to limit space capabilities, according to a new report from the Secure World Foundation. “A growing number of non-state actors are actively probing commercial satellite systems and discovering cyber vulnerabilities that are similar ... Read More
View Post

The coming infantryman may see a smarter Corps, multiple jobs for grunts

In Education, Emerging Technology, Events, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , , ,

With a rising tide of technological advances being pushed across the military, future Marine Corps recruits may be faced with stricter education requirements, and grunts might have to tackle additional job fields. “The question is what will an infantryman look like in the future,” Sgt. Major of the Marine Corps Ronald L. Green... Read More
View Post

Interview: The Navy’s top submarine builder talks Virginia-class challenges, successes

In Education, Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , ,

Whether it’s 355 ships or 342, the Navy is getting bigger. And as it looks to expand its fleet, the service is looking to its Virginia-class program as a model for success. The program has driven down costs and construction times for years while expanding its production, but now it faces a mountain of challenges as the Navy gets ready to build the follow-on ballistic missile submarine force, the Columbia-class. The program has seen... Read More
View Post

Interview: The Navy’s top submarine builder talks Virginia-class challenges, successes

In Education, Government, Security by Defense NewsLeave a Comment

Tech News Keywords: , , , , , ,

Whether it’s 355 ships or 342, the Navy is getting bigger. And as it looks to expand its fleet, the service is looking to its Virginia-class program as a model for success. The program has driven down costs and construction times for years while expanding its production, but now it faces a mountain of challenges as the Navy gets ready to build the follow-on ballistic missile submarine force, the Columbia-class. The program has seen... Read More
View Post

CA takes role in setting U.S., global standards

In Security by Long Island Business NewsLeave a Comment

Tech News Keywords: , , , , , ,

CA Technologies will now have a voice in a group that helps sets national and global standards for technology. The Manhattan-based firm with large Islandia operations has joined the executive board of the InterNational Committee for Information Technology Standards or INCITS, which seeks to set U.S. information and technology standards. Founded in 1961, INCITS is what CA called “the guiding force” in devising standards used for the information technology and communications sectors. Lynn Barra, vice president of INCITS standards operations, said the group’s goal is to use standardization for information and communications technology in a way that “balances the interests of all stakeholders, increases global co... Read More
View Post

Marines bringing cyber to the fight, commander says

In Events, Security by Fifth DomainLeave a Comment

Tech News Keywords: ,

NATIONAL HARBOR — The Marine Corps is experimenting with how it adds cyber warriors at the tactical edge, to be better prepared for a modern fight, according to the chief of Marine Forces Cyberspace Command. As the Marine Corps codifies how to use defensive cyberspace operations and related units within a Marine air-ground task force, it’s experime... Read More
View Post

Grassi & Co. enters cyber security biz

In Business, Government, Security by Long Island Business NewsLeave a Comment

Tech News Keywords: , , ,

Grassi & Co. is launching a cyber and information security practice led by Karl Kispert. The Jericho-based firm said the practice will provide “needed peace of mind by helping clients understand risk profiles, recognize potential threats, determine risk tolerance and create a cyber and information security roadmap and program.” Karl Kispert, principal of cyber and information security, has more than 28 years of experience in selling, managing and delivering information risk management, internal audit, regulatory and compliance programs, and information security and technology risk management. A former chief information security officer, Kispert has helped design and implement cybersecurity programs for many firms... Read More
View Post

Mozilla’s Internet Health Report Diagnoses Life Online

In Business, Emerging Technology, Government, Healthcare, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

The relationship between platforms and their users has never been more fraught. To see the evidence, look no further than Congress today, where Facebook CEO Mark Zuckerberg will testify about how his company reportedly mishandled data belonging to up to 87 million people by allowing it to get into the hands of the Trump-affiliated data firm Cambridge Analytica. The hearings follow a tumultuous two years not only fo... Read More
View Post

Trump’s homeland security adviser resigns

In Business, Government, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , ,

“The president is grateful for Tom’s commitment to the safety and security of our great country. Tom led the White House’s efforts to protect the homeland from terrorist threats, strengthen our cyber defenses and respond to an unprecedented series of natural disasters. President Trump thanks him for his patriotic service and wishes him well,” White House press secretary Sarah Huckabee Sanders said in a statement. His departure comes immediately on the heels of ... Read More
View Post

US revenge porn victim gets $6.4m damage award

In Government, Security by BBCLeave a Comment

Tech News Keywords:

A California court has awarded $6.4m (£4.5m) in damages to a woman in a revenge porn case. The unnamed woman sued ex-boyfriend David K Elam II after he put naked videos and pictures of her online.The award compensates for the harm done by sharing the images, stalking, emotional distress and copyright infringement.The judgement was made in a civil suit as a federal criminal case against Mr Elam was dropped in 2014.Serious injuryLegal firm K&L Gates fought the case as part of the firm's Cyber Civil Rights Project, which helps victims of reveng... Read More
View Post

Mozilla’s Internet Health Report Diagnoses Life Online

In Business, Emerging Technology, Government, Healthcare, Legal, Science & Nature, Security by Wired NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

The relationship between platforms and their users has never been more fraught. To see the evidence, look no further than Congress today, where Facebook CEO Mark Zuckerberg will testify about how his company reportedly mishandled data belonging to up to 87 million people by allowing it to get into the hands of the Trump-affiliated data firm Cambridge Analytica. The hearings follow follow a tumultuous two years not ... Read More