The increasing sophistication of cyberattacks and the emerging threat of ransomware are placing a new premium not only on high-level technical skills but on bold, effective leadership. “Each day, the cyber threat landscape changes, and our attackers are unrelenting,” said Rob Potter, vice president of the Americas for Symantec. Cyber leadership must face these evolving threats […]

The sun could pose the largest digital security risk to U.S. critical infrastructure, according to witnesses at a House Oversight and Management Efficiency Subcommittee on Tuesday. “All critical infrastructure sectors are at risk from EMP [electromagnetic pulse],” said Brandon Wales, director of the Office of Cyber and Infrastructure Analysis National Protection and Programs Directorate at […]

The 2016 Symantec Government Symposium is coming up on Aug. 30, and its awards program, the Cyber Awards, deadline is quickly approaching–June 1 at 5 p.m. ET. The Cyber Awards recognize individuals who show excellence and leadership in government cybersecurity through their personal contributions to programs that protect critical data and systems. Nominees go above and […]

Cyber hygiene is essential for combating the modern, professional hacker, according to Symantec Security Response director of project management Kevin Haley. “When cyber criminals work in call centers, write documentation, and take the weekend off, you know it’s a profession,” he said.

Connecticut, Illinois, Louisiana, Nevada, and Oregon will participate in a policy academy on developing and implementing comprehensive cybersecurity strategies, the National Governors Association announced. “Threats to our cybersecurity remain one of the most significant homeland security challenges facing the nation,” said Virginia Gov. Terry McAuliffe.

Law enforcement reported an increase in ransomware attacks during 2015, and it looks like these attacks will continue throughout 2016. To deal with the rising threats, the FBI posted recommendations. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers,” said James Trainor, the FBI Cyber Division Assistant Director.

The new reality of elections in the United States is a return to paper ballots. They’re a semi-high-tech optical scan ballot that is first marked by the voter and then processed by an optical scanner to tabulate the votes.

Speed and communication are key elements to effective threat intelligence in the government, according to panelists at the Akamai Government Forum on Thursday. “If you want to do cybersecurity to be in scale, a key enabler of that is having that information sharing piece in place,” said Renee Tarun, deputy director of the Cyber Task Force […]

Consumers comprehensively think that more needs to be done to protect their data, according to a study published by Purple Insights on behalf of ACT the App Association. The study of registered voters found that 54 percent of those interviewed trusted tech companies the most with their personal data, whereas only 21 percent trusted the government […]

1 52 53 54 55