Why is it so hard for us to pay attention to cybersecurity? Mike Tanji analyzes the latest news and trends in the cybersecurity industry.
The Department of Homeland Security and the Federal Bureau of Investigation have issued a special report acknowledging that the election infrastructure in all 50 states was targeted during the 2016 election.
The United States government has released a set of common definitions for talking about election cybersecurity issues.
The United States is currently years behind its rivals in cyberspace, both conceptually and operationally.
“The federal government should ‘lead by example’ when it comes to ensuring its computers and internet-linked devices aren’t hijacked by botnets, but industry should take the lead in determining just how those devices should be secured, according to a report released Wednesday. The report from the Homeland Security and Commerce
DHS reporting submitted by Kaspersky as part of their court case provides some insight into why the U.S. government was warning against the use of Kaspersky products. “Based on publicly available information, Kaspersky-branded antivirus software and other Kaspersky-branded products and solutions that contain antivirus functionality appear to present the general
Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other
Want more insight? This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks! Already a member? Sign in to your account.
“The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to be able to study all vulnerabilities in the public domain, autonomous bots (autbots)—not to be confused with bots simply conducting repetitive tasks like guessing default
“Here are the top 10 most infected cities and the number of infected devices — including PCs, laptops, tablets and smartphones — in each, based on Webroot’s data.” Source: The top 10 cities for computer malware