cyber security

Digital nomads and risk associated with the threat of infiltred employeesDigital nomads and risk associated with the threat of infiltred employees

Digital nomads and risk associated with the threat of infiltred employees

Companies face the risk of insider threats, worsened by remote work. North Korean hackers infiltrate firms via fake IT hires,…

3 months ago
Putin proposes new information security collaboration to US, including no-hack pact for electionPutin proposes new information security collaboration to US, including no-hack pact for election

Putin proposes new information security collaboration to US, including no-hack pact for election

Putin is proposing a new cyber security collaboration with the United States, including a no-hack pact for the upcoming Presidential…

5 years ago
Cyber Defense Magazine – August 2020 has arrived. Enjoy it!Cyber Defense Magazine – August 2020 has arrived. Enjoy it!

Cyber Defense Magazine – August 2020 has arrived. Enjoy it!

Cyber Defense Magazine august 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 147 pages of…

5 years ago
Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreakOrganizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreak

Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreak

Organizers of Black Hat Asia and DEF CON China security conferences announced that they put the events on hold due…

5 years ago
City of Naples, Florida, lost $700K after a cyberattackCity of Naples, Florida, lost $700K after a cyberattack

City of Naples, Florida, lost $700K after a cyberattack

Another city in the United States was hit by a cyber attack, according to officials in the city of Naples…

6 years ago
EU launches bug bounty programs for 15 softwareEU launches bug bounty programs for 15 software

EU launches bug bounty programs for 15 software

The European Commission decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project. Bug…

6 years ago
GAO report reveals new Pentagon weapon systems vulnerable to hackGAO report reveals new Pentagon weapon systems vulnerable to hack

GAO report reveals new Pentagon weapon systems vulnerable to hack

According to a new report published by the Government Accountability Office (GAO) almost any new weapon systems in the arsenal…

7 years ago
Cyber Defense Magazine Annual Global Edition for 2018 has arrived. Enjoy it!Cyber Defense Magazine Annual Global Edition for 2018 has arrived. Enjoy it!

Cyber Defense Magazine Annual Global Edition for 2018 has arrived. Enjoy it!

We hope you enjoy our Cyber Defense Magazine Annual Global Edition for 2018 including our Global Awards Winners for 2018...packed…

7 years ago
Cyber attack took offline flight display screens at the Bristol AirportCyber attack took offline flight display screens at the Bristol Airport

Cyber attack took offline flight display screens at the Bristol Airport

The Bristol Airport was hit by a cyber attack that caused problems with operations, flight display screens were taken offline…

7 years ago
Experts believe US Cyber Command it the only entity that can carry out ‘hack backs’Experts believe US Cyber Command it the only entity that can carry out ‘hack backs’

Experts believe US Cyber Command it the only entity that can carry out ‘hack backs’

The U.S. government should opt to carry out hack backs as retaliation against the massive attacks against organizations in the…

7 years ago