The federal government has awarded Booz Allen Hamilton a massive $621 million, six-year contract to implement a Department of Homeland Security program aimed at securing federal networks from cyber threats.
CS Digest Section: Private Sector
CISOs recognize these issues and many organizations are actively hanging a "help wanted" sign to find cybersecurity talent. Unfortunately, it is exceedingly difficult to bring new people onboard. Why? Experienced cybersecurity professionals are in high demand, so organizations are engaged in a battle royale to coax them away from their present employers and
The Information Systems Security Association (ISSA) and independent industry analyst firm Enterprise Strategy Group (ESG) revealed trending data finding that the cybersecurity skills shortage is worsening and becoming a rapidly widening business problem. The majority of survey respondents (70 percent) continue to believe that the cybersecurity skills
We should take from this recent attack a renewed determination for more urgent collective action. We need the tech sector, customers, and governments to work together to protect against cybersecurity attacks. More action is needed, and it’s needed now. In this sense, the WannaCrypt attack is a wake-up call for all of us. We recognize our responsibility to
The event expands on the DoD 'Hack the Pentagon' bug bounty program by broadening the participation pool from U.S. citizens to include "white hat" hackers from the United Kingdom, Canada, Australia and New Zealand.
"The sharing of individual indicators of compromise without context leaves practitioners asking more questions than having them answered," Intel Security Group vice president Scott Montgomery said at a March 9 hearing of the Cybersecurity and Infrastructure Protection Subcommittee of the House Homeland Security Committee.
While President Barack Obama chose to sanction the Russian individuals and organizations linked to the U.S. election cyber attacks, the Homeland Security Department and FBI are soliciting the help of the private sector in the wake of the network hacks.
Boston, Mass.-based Rapid7 can, effective immediately, assign CVE identifiers to vulnerabilities found in its own products and software from other vendors, regardless if the issues have been disclosed by Rapid7 employees or third-party experts.
Microsoft, Intel, and IBM are three of the most vocal companies that opposed China’s plans to access proprietary source code of software and technology products in order to make sure that they’re hackerproof or do not include backdoors.