Phone mobile security protection

With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology. […]

Most private and public sector CIOs have, are, or will be increasing their spending on cybersecurity and automation software deployments, according to a survey released today by Grant Thornton and the TBM Council.






[…]

Palo Alto Networks’ Unit 42 researchers announced on Friday that they have identified a spear phishing campaign from November 2018 that is targeting U.S. national security think tanks and academic institutions. Research indicates that the “threat actor might have interests in gathering intelligence related to not only North Korea, but possibly wider in the Northeast Asia region.”






[…]

The Cybersecurity and Infrastructure Security Agency (CISA) is seeking feedback on proposed updates to the National Emergency Communications Plan (NECP) after being informed from 2018 baseline assessment results.






[…]

chip hack cybersecurity cyber

The White House on Wednesday issued its new National Strategy for Aviation Security (NSAS) which calls for greater efforts to protect the U.S. “Aviation Ecosystem” from a range of threats including those posed by cyberattacks and unmanned aerial systems (UAS).






[…]

Pentagon Military Defense DoD

The Department of Defense’s Artificial Intelligence Strategy puts the DoD on more of a fast track toward developing and employing AI and machine learning to support, as the strategy’s preface states, “a force fit for our time.” The strategy outlines an accelerated, collaborative approach with industry, academia, and allies toward new technologies that will “transform […] […]

Cybersecurity cyber

Cybersecurity technologies provider Symantec reported that ransomware activity fell by 20 percent in 2018 on a year-over-year basis, but that the focus of attacks shifted sharply toward enterprises and away from consumers last year.






[…]

Independent Security Evaluators (ISE) found security flaws in several popular password managers. In a report released yesterday, ISE found flaws that expose user credentials in computer memory while locked.






[…]

ransomware
Cyber Security Brainstorm

The Intelligence Advanced Research Projects Activity (IARPA) announced it will host a Proposers’ Day on Feb. 26 for its Secure, Assured, Intelligent Learning Systems (SAILS) program, and its Trojans in Artificial Intelligence (TrojAI) program.






[…]

Cybersecurity flag
Cybersecurity cyber

Discussions this morning with a Federal agency IT professional and an IT acquisition professional revealed very different views of the Federal government’s security posture.

Shared on the condition of no attribution during an AFCEA (Armed Forces Communications and Electronics Association) Bethesda event Tuesday morning, the speakers’ varying opinions showed how the balance between security and effectiveness is an issue still up for debate.






[…]

Panelists at a Brookings Institution event last week agreed that it’s more important to implement artificial intelligence (AI) and other “smart cities” technologies in a secure and responsible manner, rather than merely to win the race to be the first tech adopters on the block.






[…]

The EastWest Institute (EWI) on Thursday released a new report providing guidance on how to make tomorrow’s “smart cities” secure and safe through effective technology management by executives and administrators.






[…]