Security News

Japanese defense contractors Pasco and Kobe Steel this week disclosed cyber intrusions they suffered back in 2016 and 2018. Pasco is Japan's largest geospatial service provider and Kobe Steel is a major steel manufacturer.

A new Maryland bill would ask the state's Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks. Senate bill 120, introduced by Sen. Susan Lee, D-Montgomery, would give the Maryland Department of Information Technology the expanded responsibility of developing a cybersecurity strategy and helping agencies within the state implement it at their discretion.

Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the complete answer to the malicious email problem. "Some businesses are giving up on technology and defaulting to an awareness-based security program for detecting email attacks, but that sets them up for failure. Our brains are wired to look for patterns and repeat processes, so for something that we do daily like email, it's only a matter of time before an employee accidentally clicks a link from a 'trusted' company," he told Help Net Security.


Through partnership with the Defense Digital Service, the U.S. Department of Defense and HackerOne, the number one hacker-powered pentesting and bug bounty platform, announced the results of the second Army bug bounty program, 'Hack the Army 2.0'. Fifty-two trusted hackers participated in the Hack the Army 2.0 bug bounty challenge, reporting 146 valid vulnerabilities over the course of five-weeks.

MobileIron announced that its FedRAMP Authorized MobileIron Cloud offering now includes MobileIron Threat Defense. This means federal agencies can build upon MobileIron Cloud with MTD for mobile threat detection and remediation.

Organizations should long ago have put in place multifactor authentication and a breach response plan and continued to actively shore up any defenses that are lagging. Here's the U.S. government once again warning organizations that support critical infrastructure to do the basics.

The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers. Plus, a case study on cross-border payment fraud, and an expert's take on...

University of Arizona-led teams will be more proactive in the battle against cyberthreats thanks to nearly $1.5 million in grants from the National Science Foundation.

Manufacturers and utilities rank highest while e-commerce companies come in last.