Antivirus company Avira reports a new wrinkle in malware: A phishing e-mail that contains explicit instructions for infecting your computer. It’s so crazy, it just might work.
According to Verizon's 2015 Data Breach Investigations Report, more than 317 million new pieces of malware -- computer viruses or other malicious software -- were created in 2014. That means nearly one million new threats were released each day.
Someone has to…
Agencies are getting more and better technology, but IT is not providing the productivity and return that it could. Federal customers need to partner with vendors to focus on mission and outcome for IT, not just functionality and affordability.
With many states relying on IT systems that are 20 years old or more, government agencies are challenged to secure legacy technology that is no longer supported and often hidden from view.
Carlos Soto
It’s natural to assume the most direct impact of a cyberattack within the financial payment system is the stolen data or funds. In reality, the true impact extends to the loss of consumer confidence and the subsequent increase of transactional costs.
Most…
While the Justice Department is trying to get backdoors into mobile consumer devices, NIST is working to improve security and privacy of electronic medical records and devices.
Cybersecurity has a high profile in the president’s agenda for his final year. There are some good ideas in his Cybersecurity National Action Plan, but whether they translate into improved security will depend on Congress and the next president.
The Defense Department has given contractors two years to meet new requirements for securing sensitive DOD data on nonfederal IT systems, responding to industry concerns over moving too quickly to the new standards.
The Air Force is on track to deliver in August 2016 the first of a series of advanced GPS satellites that promise to vastly improve the accuracy, reliability and security of the global positioning system constellation used by the military and civilian…
DHS plans to begin an automated threat information sharing program for the private sector this month. Not everyone is enthusiastic, but some think the department can be a catalyst for improved cybersecurity collaboration.
