The renamed agency will oversee cybersecurity under a reorganization bill that went to the White House for the president’s signature.
Scanning Akamai?s Edge Servers for Vulnerabilities, Correctly
Continuous monitoring of the Akamai Edge Platform for security vulnerabilities is an integral part of all engineering efforts at Akamai. In addition to our internal vulnerability management program, we engage with third-party assessors to periodically …
BlackBerry Acquires Cylance for $1.4bn
BlackBerry will include Cylance’s AI offerings to enable the enterprise of things.
Most Orgs Enabling BYOD Lack Security Controls
Employee mobility and satisfaction are the main drivers for enabling BYOD.
Japanese Cybersecurity Minister Doesn’t Use a PC
Senior politician appeared confused over basic questions
MPs Slam Government Over CNI Skills Crisis
Response to committee report lacked urgency, says chair
One Million Kids Tracker Watches Deemed Unsafe
Researchers find major flaws which could put children in danger
#InfosecNA18: Threat Sharing Makes Good Neighbors
Is collaborating and sharing threat intelligence an option or a responsibility?
#InfosecNA18: NSA Weighs In on SOC Defense
What are the common strategies that will harden defenses in the NSA’s cybersecurity threat operations center and industries’ security operations centers?