Tag: cybersecurity

What I’ve Been Doing For Two Years

If you love what you do and want to be useful, or maybe you have an idea you believe you could be of huge help to others, you’ll find it here. My name is Chloe and I am a recent grad of the network security program at Carnegie Mellon University where I have been working…

Read More

Attackers Target Critical Infrastructure in South Asia

Attackers are targeting critical infrastructure in South Asia in the name of a “cyber war. ” The attacks come in the wake of the growing tension between the U. and China and are designed to coerce governments and critical infrastructure in Pakistan, India, and Afghanistan to join U. -led cybersecurity efforts. In recent days, Pakistan’s…

Read More

The Federal Government’s Cybersecurity Program

In 2013, the federal government‘s Cybersecurity Information Sharing and Analysis Center announced its plan to increase the number of federal cybersecurity resources. The Center’s website provides more details on the organization’s goal and how federal departments would increase their cyber operations and cybersecurity capabilities. The Center is composed of the Departments of Homeland Security and…

Read More

Cloud Computing Security Issues and Solutions

According the the recent trends in the world, companies are taking a new path towards digitalization. Cloud computing, IoT and a global cybercrime management and detection are the new trends in the world that will be very attractive. Cloud technology can be a solution for improving the security posture of the company and can enable…

Read More

The Federal Cybersecurity Strategy of Fortinet

Today’s federal government is facing a daunting and costly problem. The National Security Agency’s (NSA) Tailored Access Operations (TAO) program requires federal agencies to share sensitive information with the private sector and, eventually, with foreign intelligence services. The private industry is understandably concerned that TAO will produce large amounts of information about the government—both by…

Read More

The Use of Machine Learning Methods for Network Security

There is a growing body of research that focuses on the implementation of machine learning methods for network security. This paper surveys some of the research on this topic from a cybersecurity security perspective. Security researchers are also engaged in the research and development of these methods. We also provide recommendations to practitioners on how…

Read More

RCIP Uganda – Cyber Security Awareness Campaign

The National Institute of Technology, Hyderabad: A NITA-U Cyber Security Campaign, on the lines of the recently launched ‘Cybersecurity: Digital Threats and Responsibilities’ (CDTR) campaign, has been declared by the Department of Information Technology, Hyderabad. It is the first cyber security campaign launched by the Department and seeks to educate the students of NITA-U about…

Read More

Secure Web Gateways for Remote Workers

Abstract: The development of secure gateways is important because it enhances the security of remote network operations using web services to access the web resources. However, the security of web services has increased with the increasing use of the WCF security model. Currently, the use of the WCF security model is mainly restricted to web…

Read More

Turning a Blind Eye to Britain’s Largest Semiconductors Into Geopolitical Leverage

The Government of the United Kingdom is reviewing its acquisition of a Chinese semiconductor firm, following concerns about the company’s behaviour. According to the Foreign Office, the UK intends to review the purchase following consultation with its closest allies. At present, we are not aware of what, if any, changes have been agreed in the…

Read More

ClockWatch Service – A Vulnerability in the Latest Version of the Service

A vulnerability in the latest version of the enterprise version of the ClockWatch service has been confirmed. The current version of ClockWatch has been updated by the vendor with a vulnerability that could allow an authenticated user to create a persistent, local, modified image of a file. The service, currently in a pre-release version, is…

Read More