Two Republican lawmakers Wednesday demanded that the U.S. Department of Health and Human Services (HSS) provide information on security measures used to secure the Federal Data Services Hub
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety of things – including ship-to-ship communication
Wisegate released a new report that shares how CISOs successfully gain executive buy-in on security budgets and strategically manage them.
We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s also interesting to turn the cliché on its head.
In a rather shrewd move, Google has said it will provide Chrome updates for Windows XP users for at least a year after Microsoft stops supporting the elderly OS next April.
A group of boffins from Carnegie Mellon University is proposing that inkblot-style patterns form the basis of a system to replace CAPTHCAs, and is offering an open challenge to see how well it works.
In this DerbyCon video, John Strand will demonstrate the Active Defense Harbinger Distribution, a DARPA funded, free Active Defense virtual machine.
You’ve probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: “The IoT: A Primer” at the end of this piece), while still in the early stages of development
Rapid7 has acknowledged that it waited too long to take the security actions needed to prevent a pro-Palestine hacking group from taking down two of its websites by sending a fax to the sites’ registrar.
This guide assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction – all the while sneaking in little nuggets of UNIX wisdom and lore.