U.S. President Joe Biden is set Wednesday to sign an executive order aimed at bolstering cybersecurity in maritime ports, including a directive for the Coast Guard to develop minimum cybersecurity standards for the marine transportation system.
South Korea's election watchdog warned on Monday that the parliamentary elections in April could be marred by artificial intelligence-generated deepfake campaigns aimed at influencing voters. The country's recently amended Elections Act bans the use of deepfakes for election campaigning.
The National Institute of Standards and Technology issued new guidelines to help software developers integrate software supply chain security into every phase of the software development life cycle as experts say organizations are seeking comprehensive guidance on how to accomplish federal mandates.
CISO Sam Curry and CMO Red Curry discuss the chaos and disruption of cyberwar and how attacks on critical infrastructure can tactically help attackers in combat, demoralize the general population and affect critical capabilities at just the right point in time.
A European court has sided with a Russian petitioner who challenged a Kremlin rule that requires telecom firms to backdoor their servers for law enforcement data collection. The court found that end-to-end encryption is essential to preserving the right to privacy in digital communication systems.
The South Korean President's Office told local media Tuesday that suspected North Korean hackers had targeted the private email account of an official in November ahead of the president's state visits to the U.K. and France. Local reports suggest the hackers accessed the details of scheduled events.
A federal government IT modernization funding program is looking to invest in projects that will help hasten the implementation of artificial intelligence to improve efficiencies and service delivery among government agencies. It will favor proposals with budgets under $6 million.
With over 1 billion people across more than 50 countries - including the U.S., the U.K. and India - due to hold elections this year, one open question remains: How can nations combat adversaries who attempt to influence elections or otherwise interfere via physical, cyber or operational means?
National Cyber Director Harry Coker said the administration is introducing a new set of "liability regimes" to hold software providers accountable for deploying unsafe systems, but experts say processes to prove that manufacturers are invested in security already exist.
The Cybersecurity and Infrastructure Security Agency launched a public-private sector collaborative in 2021 to help unify cyber defenses between government and industry, but experts testified Tuesday that the program is suffering from "growing pains" that are hindering its success.
The Filipino government has accused China-based threat actors of hacking into the websites of a half-dozen government entities and infiltrating government email systems. DICT officials said the hackers used China-based IP addresses and the services of Chinese telecom firm Unicom to mount attacks.
The United States ramped up pressure on the commercial surveillance industry shortly before the United Kingdom and France convened a two-day meeting dubbed the Pall Mall Process intended to culminate in an international agreement limiting the proliferation of advanced spyware.
In times of conflict, such as the Israel-Hamas war, intelligence becomes even more important than it is in peacetime. Red Curry, chief marketing officer at Tautuk, and his brother, Sam Curry, CISO at Zscaler, discuss the need for a combined intelligence strategy and better resilience in wartime.
The U.S. Department of Commerce has formed a landmark supply chain agreement with 13 countries in the Indo-Pacific region that will go into effect Feb. 24. The agreement provides a framework to secure critical supply chains from disruptive events such as cyberattacks and armed conflicts.
Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we examine what happens when ransomware groups get careless, application developers' laissez-faire attitude toward vulnerabilities, and the security woes of a beleaguered crypto exchange.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.