Eminent cybersecurity expert Dr. Edward Amoroso will be a keynote speaker for the 2017 Cyber Security R&D Showcase and Technical Workshop on July 11-13, 2017 at the Mayflower Hotel in Washington, D.C.
German officials and lawmakers say the attacks are the latest in a series aimed at disrupting German elections and damaging Chancellor Angela Merkel, who has pushed to maintain sanctions on Russia over its actions in eastern Ukraine.
US intelligence officials are expressing concern over a Russian cybersecurity company’s access to US government systems and pushing the General Services Administration for answers on how long it has been approved for use by US agencies.
The Department of Homeland Security (DHS) has submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile devices and recommends security improvements within the mobile device ecosystem.
Watching the movie A Beautiful Mind, where Russell Crowe played John Nash, a professor of mathematics who won the Nobel Prize for his contributions to a complex concept called game theory, one would never guess that a hypothesis of his Nash equilibrium would someday help improve cybersecurity strategy.
High-speed wireless "underwater internet" of the type that is now pervasive in the world's cities is still just theory. Without a cable, data just doesn't transmit easily through water (even less so when it is salt water).
According to MIT experts, over the last 25 years presidents from both parties have paid lip service to the topic while doing little about it, leading to a series of short-term fixes they liken to a losing game of "Whac-a-Mole." This scattershot approach, they say, endangers national security.
Sophisticated cybersecurity systems excel at finding "bad apples" in computer networks, but they lack the computing power to identify the threats directly.
Donald Trump's first federal budget puts forward US $1.5 billion for cyber-security to protect the federal government and US critical infrastructure.
"The sharing of individual indicators of compromise without context leaves practitioners asking more questions than having them answered," Intel Security Group vice president Scott Montgomery said at a March 9 hearing of the Cybersecurity and Infrastructure Protection Subcommittee of the House Homeland Security Committee.