In a case echoing the massive information security breach by U.S. National Security Agency (NSA) contractor Edward Snowden in 2013, another contractor has been brought up on charges of sharing classified material with the press. Though a much smaller...
It is feared that Europe may be facing a serious shortage of information security technicians as soon as 2022. This at a time when cyber attacks — especially from Russia — are on the rise and present an ongoing...
Expanding and developing its presence and impact in the Middle East, Seclore Technologies, provider of Enterprise Digital Rights Management (EDRM) solutions has appointed Redington Gulf, a distributor of IT products in the Middle East and Africa region - as...
Identifying the threats and security emerging from cyberspace, Reserve Bank of India has appealed lenders to place a cybersecurity policy immediately to combat the issue. "It is essential to enhance the resilience of the banking system by improving...
Internet of Things (IoT) security provider Zingbox announced its annexation in Gartner's May 2017 Cool Vendors in IoT Security report.
"ZingBox is the industry's first and only IoT security solution provider to leverage the individual personalities of IoT devices to...
Kathleen Patentreger, Senior Vice President of Programs, CIS (Center for Internet Security) has been selected to the Board of Advisors of the PCI Security Standards Council.
PCI Security Standards Council (PCI SSC) works on securing payments by providing data security...
China — in an attempt to counteract cyber warfare and data breaches — implemented a contentious new law that allegedly imposes strict requirements on data storage and scrutiny.
Approved in November of 2016 by China’s National People’s Congress, it prohibits...
The ability of local governments across the United States to protect against cyber attacks is limited due to a shortage of funding. This is particularly troubling because not only do local governments hold a vast amount of data about...
Cisco and IBM have entered a partnership to combat global cyber threats. The major partnering wings will be IBM X-Force and Cisco Talos security.
As part of the partnership, Cisco will also build new applications for IBM’s QRadar. IBM's Resilient...
The network security of a cosmetic surgery facility in Lithuania was hacked by a group calling itself the “Tsar Team.”The group subsequently attempted to blackmail the company and the individuals whose personal information was released.
The refusal to pay the...