Securing cyberspace at the edge of the fight is not just about compliance, it is about agility and innovation, according to Peter E. Kim, Chief of Information Security Officer for the Air Force who spoke at the 2017 FCW Cybersecurity Summit. This new way of looking at cybersecurity implementation has been called the Cybersecurity Initiative, explained Kim.
Is the rush to bring personalized software into schools putting student data at risk? Researchers from the National the National Education Policy Center (NEPC) say, yes. Earlier this week they released an extensive report asking lawmakers to put up some legal barriers to protect student information.
China has sent an "unbreakable" code from a satellite to the Earth, marking the first time space-to-ground quantum key distribution technology has been realized, state media said on Thursday. China launched the world's first quantum satellite last August, to help establish "hack proof" communications, a development the Pentagon has called a "notable advance".
The characteristics of the cybersecurity war in which the United States is now engaged are not dissimilar from any team sporting contest. Whether in football, baseball or basketball, the game is won or lost on four key elements. Winning almost always comes down to offense, defense, coaching, and playbook execution.
Research done by the Georgetown’s Center on Education and the Workforce predicts that there will be 9 million STEM jobs by 2018. This is a list of coolest occupations in STEM right now across three promising industries, offering incredible prospects for growth, impact and compensation.
The New Collar Jobs Act, sponsored by Reps. Ted Lieu, D-Calif., Matt Cartwright, D-Pa., and Ann McLane Kuster, D-N.H., would amend the IRS code to create a tax credit for businesses that enroll their workers in undergraduate or graduate programs that teach cybersecurity skills.
A bipartisan group of U.S. senators on Tuesday plans to introduce legislation seeking to address vulnerabilities in computing devices embedded in everyday objects - known in the tech industry as the “internet of things” - which experts have long warned poses a threat to global cyber security.
For the second time, Chinese security researchers were able to hack a Tesla Model X, turning on the brakes remotely and getting the doors and trunk to open and close while blinking the lights in time to music streamed from the car's radio -- an effect they dubbed "the unauthorized Xmas show."
Three House Democrats on Tuesday introduced a multi-layered bill aimed at boosting the cybersecurity workforce. The "New Collar Jobs Act," released by Reps.(Calif.), (Pa.) and Ann McLane Kuster (N.H.), would establish incentivized tax breaks for employers offering cybersecurity training, increase funding for a cyber scholarship program and establish a student debt relief program for cybersecurity job takers.
Email security advice for end users typically tells them to look for obvious, tell-tale signs that something about an email isn’t ‘right’, such as a slightly misspelt sender name or unusual domain name. However, even the most eagle-eyed user will be tricked by a malicious email that is visually identical to the real thing.