News

Many keys, one lock  >  Brute-force credential stuffing.
A firmware message appears on a circuit board.

election hacking security 2020 election security flag global breach by stuartmiles99 getty

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing.

cloud security / data protection / encryption / security transition

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack.

USA / United States Capitol Building / Congress / abstract digital infrastructure

On the 2020 Congressional cybersecurity agenda: Critical infrastructure, copyright exemptions

Despite the distraction of an election year, Congress is expected to give the Department of Homeland Security tools to identify critical infrastructure threats and copyright exemptions to security researchers.

gavel / money

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

Two FCA cases unsealed in 2019 show that contractors can face multi-million-dollar penalties if they don't comply with federal government cybersecurity requirements.

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.

online shopping cart magecart hackers shopping online

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing.

medical network h/ ealthcare IoT / hospital connections and communications

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications.

Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements.

United States Capitol Building / Congress / legislation in a digital landscape

2020 outlook for cybersecurity legislation

Here's a rundown of all the security-related bills working their way through this year's U.S. Congress, plus some hot security topics likely to be debated.

Insider Pro | Computerworld  >  100 Best Places to Work in IT [2020]

Deadline extended for 100 Best Places to Work in IT 2020

The deadline for nominating a company for Insider Pro's Best Places to Work awards program has been extended to January 17, 2020. The annual survey, which launched in 1994, identifies the 100 best places to work for IT pros.

Load More