How Benjamin Franklin is inspiring defenders to protect critical infrastructure

The digital world is (mostly) on fire. Two new projects have tapped hackers to try and put it out.

The post How Benjamin Franklin is inspiring defenders to protect critical infrastructure appeared first on CyberScoop.

Continue reading How Benjamin Franklin is inspiring defenders to protect critical infrastructure

Shareholder-tracking company Equiniti shells out $850K to SEC over breaches

According to the Securities and Exchange Commission, the company’s failures led to the loss of $6.6 million in client funds.

The post Shareholder-tracking company Equiniti shells out $850K to SEC over breaches appeared first on CyberScoop.

Continue reading Shareholder-tracking company Equiniti shells out $850K to SEC over breaches

Democrats give cyber short shrift in party platform

It’s similar to the Republican platform in that way but a departure from the 2020 Democratic policy document.

The post Democrats give cyber short shrift in party platform appeared first on CyberScoop.

Continue reading Democrats give cyber short shrift in party platform

Democrats give cyber short shrift in party platform

It’s similar to the Republican platform in that way but a departure from the 2020 Democratic policy document.

The post Democrats give cyber short shrift in party platform appeared first on CyberScoop.

Continue reading Democrats give cyber short shrift in party platform

FAA to issue cyber rule for newly built airplanes and equipment

The Biden administration looks to add cybersecurity defenses to a plane’s airworthiness.

The post FAA to issue cyber rule for newly built airplanes and equipment appeared first on CyberScoop.

Continue reading FAA to issue cyber rule for newly built airplanes and equipment

Zero trust: How the ‘Jia Tan’ hack complicated open-source software

The volunteers that maintain open-source software have always been knocked around by the tech community. The Jia Tan hack made it all so much worse.

The post Zero trust: How the ‘Jia Tan’ hack complicated open-source software appeared first on CyberScoop.

Continue reading Zero trust: How the ‘Jia Tan’ hack complicated open-source software

Key metrics for monitoring and improving ZTNA implementations

In this Help Net Security interview, Dean Hamilton, CTO at Wilson Perumal & Company, discusses the complexities of zero trust network access (ZTNA) implementation, focusing on balancing security with operational efficiency. Hamilton highlights str… Continue reading Key metrics for monitoring and improving ZTNA implementations