New cyber security directive from DHS has cut mandatory time for U.S. federal government agencies to patch vulnerabilities considered critical from 30 to 15 days, failure to do so may result in administrative penalties.
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security.
Recent DEFCON Voting Village report showed that some of the most popular and widely used voting machines vulnerable to hacking and that their security in the upcoming election is anything but assured.
The U.S. government reveals the Vulnerabilities Equities Process which decides if vulnerability data is released or gets stockpiled as cyber weapons.
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats.
So how does the United States Air Force with over 5,000 aircraft in its inventory make sure that it’s online security is top notch? It’s simple – it invites people to hack its systems.
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent…