A European court has sided with a Russian petitioner who challenged a Kremlin rule that requires telecom firms to backdoor their servers for law enforcement data collection. The court found that end-to-end encryption is essential to preserving the right to privacy in digital communication systems.
The South Korean President's Office told local media Tuesday that suspected North Korean hackers had targeted the private email account of an official in November ahead of the president's state visits to the U.K. and France. Local reports suggest the hackers accessed the details of scheduled events.
A federal government IT modernization funding program is looking to invest in projects that will help hasten the implementation of artificial intelligence to improve efficiencies and service delivery among government agencies. It will favor proposals with budgets under $6 million.
With over 1 billion people across more than 50 countries - including the U.S., the U.K. and India - due to hold elections this year, one open question remains: How can nations combat adversaries who attempt to influence elections or otherwise interfere via physical, cyber or operational means?
National Cyber Director Harry Coker said the administration is introducing a new set of "liability regimes" to hold software providers accountable for deploying unsafe systems, but experts say processes to prove that manufacturers are invested in security already exist.
The Cybersecurity and Infrastructure Security Agency launched a public-private sector collaborative in 2021 to help unify cyber defenses between government and industry, but experts testified Tuesday that the program is suffering from "growing pains" that are hindering its success.
The Filipino government has accused China-based threat actors of hacking into the websites of a half-dozen government entities and infiltrating government email systems. DICT officials said the hackers used China-based IP addresses and the services of Chinese telecom firm Unicom to mount attacks.
The United States ramped up pressure on the commercial surveillance industry shortly before the United Kingdom and France convened a two-day meeting dubbed the Pall Mall Process intended to culminate in an international agreement limiting the proliferation of advanced spyware.
In times of conflict, such as the Israel-Hamas war, intelligence becomes even more important than it is in peacetime. Red Curry, chief marketing officer at Tautuk, and his brother, Sam Curry, CISO at Zscaler, discuss the need for a combined intelligence strategy and better resilience in wartime.
The U.S. Department of Commerce has formed a landmark supply chain agreement with 13 countries in the Indo-Pacific region that will go into effect Feb. 24. The agreement provides a framework to secure critical supply chains from disruptive events such as cyberattacks and armed conflicts.
Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we examine what happens when ransomware groups get careless, application developers' laissez-faire attitude toward vulnerabilities, and the security woes of a beleaguered crypto exchange.
Proposed legislation called the "snoopers' charter," which would allow British intelligence agencies to collect data on a large scale, cleared further parliamentary scrutiny this week despite mounting criticism from privacy advocates, watchdog groups and technology companies.
U.S. federal agencies have until midnight Friday to disconnect Ivanti VPN devices and perform a factory reset before reconnecting them to the network. Fifteen agencies use the gateways, which were hit by likely Chinese hackers in an espionage campaign and are riddled with zero-day vulnerabilities.
South Korean President Yoon Suk Yeol expects North Korea to interfere with the upcoming legislative elections and warned citizens to prepare for waves of cyberattacks, fake news and disinformation. Investigators believe North Korea conducted 80% of the attacks on public sector organizations in 2023.
The Biden administration is contemplating updating for the artificial intelligence age the privacy guidance that federal agencies must follow before activating new systems or adding a new collection of personal identifiable information to existing information technology systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.