Security Worries About OutsourcingToday’s New York Times reports on security concerns about software whose programming has been outsourced to other countries. The Times reports that while there are no known instances of abuse of outsourcing by hackers, experts worry about software that is written in countries like Pakistan, the Philippines and Russia.CSIS Says Cyberterrorism Is HypedComputerworld. The Center for Strategic and International Studies (CSIS) has published a paper claiming that the threat of cyberattack has been overrated by both the government and the media, according to a story in Microsoft Focuses on Homeland SecurityDow Jones Business News last Friday. While Microsoft has been selling to government agencies for decades, Dow Jones reports, it stepped up its Homeland Security focus in November. That month, Microsoft named Thomas Richey, a former Coast Guard official and an adviser to Democratic presidential aspirant Sen. John Kerry of Massachusetts, as its first director of Homeland Security. “This is not about packaging Microsoft products in an expedient manner to get on the Homeland Security gravy train,” Richey says. “It’s quite the opposite.” Nonetheless, the story points out, the country’s spending on information technology related to domestic security will increase by about 20 percent over a five-year period, to more than $12 billion by 2008, according to estimates by the Government Electronics & Information Technology Association, a technology industry group. Smoothing communication among the 22 agencies to be joined under the Department of Homeland Security Jan. 24 is a top concern for the governmentand for Microsoft Corp., according to a story in Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe