Advertisements


KC-46 Refueling Tanker Faces More Delays, Auditors Say

A new study suggests the Air Force’s KC-46 refueling tanker has saved $7.3 billion in lifetime costs for the program but could face additional delays.... A new study suggests the Air Force’s KC-46 refueling tanker has saved $7.3 billi.....»»

Source:  DefensetechCategory: Security3 hr. 33 min. ago Related News

Complete security deception includes detection and incident response

Deception tools have been growing in popularity over the past several years, but customers need to ensure they are using the technology to its fullest potential. The concept behind deception is fairly simple to understand: Security teams deploy a.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

Blockchain can help secure medical devices, improve patient privacy

BOSTON -- Blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.The downsides would include mistrust of the technology because of blockc.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.Victims are lured in with fake Bitcoin walle.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

Review: Canary Flex security camera lives up to its name

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canar.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

IDG Contributor Network: 7 best practices for securing your cloud service

As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.Security in the cloud is not the same as.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

CIA, WikiLeaks and Doctor Who?

CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information......»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

Review: Canary Flex security camera lives up to its name

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canar.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

IDG Contributor Network: 7 best practices for securing your cloud service

As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.Security in the cloud is not the same as.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

Consultant urges never pay ransomware demands

When ransomware criminals lock up files and demand payment to decrypt them, don’t pay, was the advice a consultant gave to a group at SecureWorld.When there’s no risk of losing crucial data, that’s easy to say, and to make is possible requir.....»»

Source:  NetworkworldCategory: Security6 hr. 41 min. ago Related News

Marines to Test 100 New Beach-Storming Technologies

When you think of ship-to-shore maneuver and amphibious assaults, Marine Corps planners want to banish the image of an Iwo Jima-style beach landing. Instead, they... When you think of ship-to-shore maneuver and amphibious assaults, Marine Corps p.....»»

Source:  DefensetechCategory: Security17 hr. 17 min. ago Related News

Army Eyes Dual-Rotor Drone for Casualty-Evacuation

Dragonfly Pictures Inc.’s DP14 Hawk, a dual-rotor unmanned aerial system, could play a role in a U.S. Army effort to one day use drones to... Dragonfly Pictures Inc.’s DP14 Hawk, a dual-rotor unmanned aerial system, could play a role.....»»

Source:  DefensetechCategory: SecurityMar 23rd, 2017Related News

If incident response automation is hot, threat detection automation is sizzling

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.In a recent Network World article Jon Oltsik noted that Incident Response.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

If incident response automation is hot, threat detection automation is sizzling

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.In a recent Network World article Jon Oltsik noted that Incident Response.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

How to stop insider threats

Watch what leaves the officeImage by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a sign.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

Experts: US needs a federal CISO

Last week, the Trump administration announced the appointment of a White House cybersecurity coordinator. That's a good first step, security experts say, but the government also needs to have a federal CISO."It's a big leadership vacancy," said Sa.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

How to stop insider threats

Watch what leaves the officeImage by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a sign.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

Cisco security researcher: Ransomware crowd big on customer service

Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin. “They’re in it to.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

FTC warns on “Can you hear me now” robocall: Hang up!

The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country. The FTC says it has received hundreds of complaints on the calls whi.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News

How to stop insider threats

Watch what leaves the officeImage by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a sign.....»»

Source:  NetworkworldCategory: SecurityMar 23rd, 2017Related News