With a growing need to improve the security, efficiency and accuracy of passenger and baggage screening, the Department of Homeland Security (DHS) Small Business Innovation Research (SBIR) Program is working with a small business to advance explosive detection equipment. Synthetik Applied Technologies was awarded funding to develop machine learning training data that simulates human travelers and baggage object models to support machine learning algorithms.
Sudhish Kasaba Ramesh pleaded guilty in federal court to intentionally accessing Cisco's protected computer without authorization and recklessly causing damage, announced United States Attorney David L. Anderson and Federal Bureau of Investigation Special Agent in Charge John L. Bennett.
Security professionals who are considering the potential direction for their private sector career often overlook certain functional areas. While considered part of a security leader’s portfolio, many of these less obvious choices offer a broad diversity of challenges. One of these areas found in almost every industry sector is investigations.
How did we get here? Long, unstable fault lines in the bedrock that undergirds U.S. society have become active, sending seismic waves that have shaken the social contract. Citizens can’t agree on basic facts. People question whether COVID-19 is real amid shifting medical advice and conflicting data on case and death rates. The footing keeps getting less stable. Economic freefall. Surging unemployment. White supremacists, fascists and anarchists boldly emerging from the shadows. Loss of faith in law enforcement by swaths of the populace after black citizens perished in police custody. Rampant misinformation campaigns by anonymous groups and nations. The result is a bitterly split populace that has retreated to their respective echo chambers.
Flashback to 2004 and the genesis of National Cybersecurity Awareness Month (NCSAM), an initiative created to raise awareness in the U.S. around the importance of cybersecurity. Founded by the National Cyber Security Division within the Department of Homeland Security and the nonprofit National Cyber Security Alliance, NCSAM has taken place each October, since its mid-aughts inception, in efforts to ensure all Americans have knowledge of the resources and tools they need to be safer and more secure online.
Why do organizations find it challenging to respond to social engineering incidents and how they can better defend against them? We talk to Daniel Wood, CISSP, GPEN, Associate Vice President of Consulting at Bishop Fox, to find out.
The National Health Service is preparing to test drone usage to deliver emergency medical supplies to vulnerable populations in the event of a second wave of COVID-19.
While the burgeoning world of IoT has transformed the ways in which we live and work, the world of IoT has also caught the attention of cybercriminals. As IoT devices become increasingly more advanced, hackers have simultaneously become more sophisticated in their attacks, often targeting pre-existing security loopholes to gain access to company systems.
In part 1 of this series, we covered why Distributed Internet of Things devices are attractive and vulnerable targets for cyber criminals and hackers. Now we turn our attention to strategies for protecting these devices, which in turn, helps to protect your entire network.
Network administrators have long been stretched thin in their attempts to maintain global endpoint security settings, configurations and patching. Now that most, if not all, of their organization’s employees are connecting remotely, the job has become even more difficult.