Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules demonstrate the government’s determination to insist on strong cybersecurity practices among its business partners and drive compliance. Read More ▶ |
|
| Video/Webcast: Optum Sameer Siraj, vice president, strategic product management, Optum, explains. Learn about the necessity of data and challenges around managing it. Read More ▶ | China has a form of Orwell’s Thought Police -- surveillance tech to monitor employees’ brainwaves and emotions. Read More ▶ |
| The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More ▶ |
| What did we learn about cybercrime in the first quarter of 2018? Malicious cryptomining has taken over and it’s leaving all other malware families behind. Read More ▶ |
| | The aviation industry realizes insider threats are a reality and is working within the public-private partnership to heighten awareness of them. Read More ▶ |
| The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deployment, left the city scrambling to deal with critical systems that were forced offline, hampering civil services including utility payments and municipal court appointments. Read More ▶ |
| A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle between security and visibility. Read More ▶ |
| White Paper: Silver Peak Systems Inc Today, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|