Please turn on your JavaScript for this page to function normally.
hunt
CyberCops program: ROTC students as future cybersecurity gatekeepers

Not so long ago, a strong password felt mighty enough to keep you safe and your computer data private. But we now live amid heightened risks in malware, phishing, …

United Kingdom’s MoD announces the results of its bug bounty program with HackerOne

The United Kingdom’s Ministry of Defence (MoD) announced the conclusion of its first bug bounty challenge with HackerOne. The Ministry of Defence program was a 30-day, …

Infinipoint DIaaS solution offers zero trust security posture for devices

Infinipoint announced a Device-Identity-as-a-Service (DIaaS), its device identity and security posture solution that is part of a zero trust approach to secure device access. …

Black & Veatch Management Consulting achieves accreditation as a RPO from CMMC-AB

To address growing cybersecurity concerns, the U.S. Department of Defense (DoD) has introduced the Cybersecurity Maturity Model Certification (CMMC) requirement for federal …

Google Cloud’s zero trust offerings help U.S. government organizations guard against cyberthreats

Google Cloud today announced new zero trust offerings for government, a set of services to help U.S. federal, state, and local government organizations implement zero trust …

U.S. Army DEVCOM awards Ubiq Security with SBIR contract to improve encryption capabilities

Ubiq Security announced that it was awarded a SBIR contract with the U.S. Army DEVCOM. Ubiq’s platform will be utilized to help deliver highly efficient, more scalable, and …

Larry Prior joins Shift5 Board of Directors

Shift5 announces Larry Prior joins as the latest addition to their Board of Directors. Larry Prior currently serves as an Operating Executive for The Carlyle Group, where he …

Haystack Solutions CATA identifies cognitive abilities of individuals entering or upskilling in cybersecurity

Haystack Solutions introduced the Cyber Aptitude and Talent Assessment (CATA). It is the first such commercially available solution that is scientifically designed to identify …

ThreatQuotient releases ThreatQ Data Exchange to simplify bidirectional sharing of intelligence data

ThreatQuotient is addressing an industry need for more curated and data-driven threat intelligence with the availability of ThreatQ Data Exchange. Built on the foundation of …

ISC2 report
U.S. DoD approves two (ISC)² certifications as requirements for cybersecurity staff

(ISC)² announced that its healthcare security and cloud security certifications have been approved by the U.S. Department of Defense (DoD) as prerequisites of employment for …

MITRE ATT&CK D3FEND
MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to …

Broken glass
Defense supply chain vulnerabilities creating security gaps

A BlueVoyant report highlights critical vulnerabilities within the defense supply chain ecosystem. The report includes evidence of the exploitable cyber weaknesses of SMBs …

Don't miss

Cybersecurity news