Securing our nation from cyber threats requires identifying and addressing the root causes of our vulnerabilities. One such cause is the defense procurement process, which is hallmarked by delays and under inclusiveness. The Department of Defense ... The Hill, 5 days ago
White House Preps New Cyber Policy Dealing with Federal Contractors - Nextgov.com, 5 days ago
India Opens Cyber Coordination Centre - DataBreachToday, 1 week ago
Vice President Jejomar C. Binay batted for more focus on cyber resilience and protection of the country's national and international cyber infrastructure. The path ahead of us will be shaped primarily by the decisions and actions we now ...Manila Bulletin, 5 days ago Can real-world rules be applied to cyber response? Defense Systems, 3 days ago U.S. military bases vulnerable to cyberattacks on their power, utility systems Homeland Security News Wire, 5 days ago Commander Discusses Missions During Security Forum United States Department of Defense, 5 days ago
A recently passed law in China will see national security services be given tighter control over numerous aspects of daily life. National security is defined in the legislation as covering anything from religion to finance and cyber security. The ...Acumin, 1 week ago Jace Alexander, Law & Order Director, Charged with Child Pornography DangoteNews.com, 4 days ago China's New National Security Law HG.org, 5 days ago Cyber security draft law tightens rules on China's network security what does it mean for you? Lexology, 3 days ago
The National Association of Insurance Commissioners (NAIC) is increasing its efforts to tackle cyber security issues. Recently, the NAIC adopted guiding principles for cyber security and developing new reporting requirements for insurers to ...Captive Insurance Times, 5 days ago State insurance regulators take action on cybersecurity issues Automnews.com, 5 days ago
Australia plans mandatory data breach notification laws will this speed take up of cyberliability policies?
The statement came in the Government's response to a report by the Parliamentary Joint Committee on Intelligence and Security (PJCIS). The report mainly dealt with Australia's proposed data retention laws, which grants the Government controversial ...Kennedyslaw.com, 6 days ago US intelligence community report: America's weak response to cyber attacks will encourage more breaches Business Insider, 6 days ago
Imagine a national level cyber security cover for every computer and mobile phone used inside India by Indian citizens; a centralized hub which identifies cyber attacks and broadcast solutions to every citizen within seconds of its outbreak. No, this is not ...Trak.in, 2 months ago Germany, India come closer on common threats Asian Age, 2 months ago
Post-OPM Breach: Closing Today's Federal Security Gaps Is this what cyber war will look like? Reports are saying that several major breaches, including Anthem, the U.S. government's Office of Personnel Management (OPM) and United Airlines, ...IT Business Edge, 4 days ago Joint Statement by National Cyber Bureau and US Department of Homeland Security on Strengthening Cooperation in Cyber Israel Prime Ministers Office, 2 weeks ago
Sen. John McCain on Wednesday challenged federal policymakers to make it much easier for America's innovators to work with Washington. Our national security, he says, depends on it. McCain (R-Arizona), who chairs the Senate Armed Services ...Noodls, 4 days ago
U.S. Africa Command (AFRICOM) hosted 10 military officers from nine African nations during a senior leader familiarization event July 19-24, 2015. Leaders in their countries cyber security programs, the participants visited several government ...Defence Web, 4 days ago
Writing 2,500 years ago, Sun Tzu declared in his military treatise The Art of War: Supreme excellence consists of breaking enemy's resistance without fighting. It is a tribute to the Chinese military strategist's genius that his dictum holds good ...New Indian Express, 3 days ago
on your WebpageAdd Widget >Get your members hooked!