As someone who spent nearly a decade protecting U.S. interests abroad and along our borders with intelligence operations, I developed a passion for helping Americans understand why they are targets from our national adversaries.
Next spring, the Army will deploy 20,000 US-based soldiers to Europe to operate alongside 17,000 allied troops in the massive Defender-Europe 20 exercise. It will be the US Army’s largest troop movement in 25 years.
Phishing attacks are constantly expanding their reach. According to a 2019 report from Retruster, phishing cybercrimes account for 90% of data breaches. Malicious actors employ phishing emails to serve up malware and extract sensitive credentials, which entail billions of dollars in losses worldwide annually.
As we prepare to enter the next decade, telecoms are being transformed by technology in a variety of ways. From artificial intelligence (AI) to the threat of cyberattack, here are the 7 biggest technology trends that will transform telecoms in 2020.
It's always springtime for cybercriminals as they take advantage of the massive shortage of trained "white hat" cybersecurity professionals available to the industry.
"You can't skip leg day," Ryan McCarthy said after his confirmation as Army Secretary. "The last 18 years of conflict built muscle memory in counterinsurgency, [but] with this focus came atrophy in other muscle groups.
October is National Cybersecurity Awareness Month (NCSAM). It was started by the National Cyber Security Division within the Department of Homeland Security and the nonprofit National Cyber Security Alliance in 2004 to raise awareness about the importance of cybersecurity all year long.
As a member of the IT community and a proud Air Force Veteran who worked alongside some of the most talented Cyber Warriors, I know the challenges posed by bad actors in the cyber realm.
Both U.S. and U.K. government agencies have taken the unusual step of issuing a rare update now warning to Windows, macOS and Linux users concerning a critical cybersecurity threat from advanced persistent threat (APT) attackers. Here’s everything you need to know.