Cybersecurity: What Must be Done Now to Protect the Future?

John Howe: Cybersecurity, cyber-terrorism, and cyber defense are serious topics of concern for all industries, government agencies, energy, and national infrastructure entities right now and for the foreseeable future. Securing the information systems, data, and infrastructure of these Governmental, Military, Continue reading Cybersecurity: What Must be Done Now to Protect the Future?

5 Tech Issues Congress Wants GAO to Keep an Eye On

Frank Konkel: The House Oversight and Government Reform Committee provided five new directives to the Government Accountability Office related to ensuring the government maximizes its tech investments. Congress gave the Government Accountability Office an early Christmas present Thursday, requesting the Continue reading 5 Tech Issues Congress Wants GAO to Keep an Eye On

MY TAKE: What The Uber Hack Tells Us About Fresh Attack Vectors Created By The Rise Of DevOps

Bacohido: Dissecting the root cause of Uber’s catastrophic data breach is a worthwhile exercise. Diving one level deeper into the scenario that led up to the popular ride-hailing service losing personal data for 50 million passengers and seven million drivers Continue reading MY TAKE: What The Uber Hack Tells Us About Fresh Attack Vectors Created By The Rise Of DevOps

CrowdStrike Compiles ‘Casebook’ Of Cybersecurity’s Important Lessons

Sara Barker: CrowdStrike has compiled a ‘casebook’ of some of cybersecurity’s important lessons on the subjects of state-sponsored attacks, fileless malware, mean-time-to detect – and the ultimate finding that organisations are getting better at self-detection. The company’s annual Cyber Intrusion Continue reading CrowdStrike Compiles ‘Casebook’ Of Cybersecurity’s Important Lessons

Anatomy Of A Hack: Even Your ‘Complicated’ Password Is Easy To Crack

Dan Goodin: In March, readers followed along as Nate Anderson, Ars Technica deputy editor and a self-admitted newbie to password cracking, downloaded a list of more than 16,000 cryptographically hashed passcodes. Within a few hours, he deciphered almost half of Continue reading Anatomy Of A Hack: Even Your ‘Complicated’ Password Is Easy To Crack