NEW YORK/TORONTO (Reuters) – Equifax Inc (EFX.N) said it expects costs related to its massive 2017 data breach to surge by $275 million this year, suggesting the incident at the credit reporting bureau could turn out to be the most costly hack in corporate history. The projection, which was disclosed on a Friday morning earnings […]
In 2011, the election board in Pennsylvania’s Venango County — a largely rural county in the northwest part of the state — asked David A. Eckhardt, a computer science professor at Carnegie Mellon University, to examine its voting systems. In municipal and state primaries that year, a few voters had reported problems with machines ‘‘flipping’’ […]
ODNI, DHS, FBI To Lead National-level Classified Dialogue for State Election Officials On February 16 and February 18, the Office of the Director of National Intelligence (ODNI), together with the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI), will sponsor a classified briefing for election officials from all 50 states. This […]
The optimistic outlook is that the internet of things will be an enabling technology that will help make the people and physical systems of the world — health care, food production, transportation, energy consumption — smarter and more efficient. The pessimistic outlook? Hackers will have something else to hack. And consumers accustomed to adding security tools to their computers and phones should expect to adopt similar precautions with internet-connected home appliances
At the NTCA Cybersecurity Summit, October 16-18 in Arlington, Virginia, CyberESI was among the experts contributing to a discussion on “Securing Customer Data” in a world of rapidly evolving cyber-threats. He spoke on security policies and specific steps organizations should take to protect personal information and data, and to respond effectively in the event of […]
The Industrial Internet Consortium (IIC) has released the initial version of its Security Framework for industrial Internet of Things (IIoT) development. The goal is to ensure that security is a fundamental part of an IIoT system's architecture, not simply bolted on, and covers the system end-to-end including endpoint devices and the links between system elements.
The U.S. Department of Defense (DOD) wants to make sure its future ground system for government satellites, known as the Enterprise Ground Segment (EGS), makes cybersecurity a much bigger priority compared to the approach taken with ground systems currently in use.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.