cybersecurity

See the following -

An Interview With Federal CIO Steven VanRoekel On The Future Of Computing

Matt McLaughlin and Jimmy Daly | Fedtech | April 22, 2013

As the second federal CIO, Steven VanRoekel inherited an ambitious agenda from his predecessor, Vivek Kundra, including efforts to implement cloud computing and to consolidate the number of federal data centers, among other priorities laid out in 2010’s 25 Point Implementation Plan to Reform Federal IT. Read More »

Apache Roadshow Conference to Take Place in Washington DC

Press Release | Apache Software Foundation, George Mason University | March 4, 2019

ApacheCon, the official conference series of The Apache Software Foundation (ASF), announced today the Apache Roadshow/DC, held in partnership with George Mason University (GMU)...The Apache Roadshow is held in cooperation with the Center for Assurance Research & Engineering (CARE) of the Volgenau School of Engineering at George Mason University. The multidisciplinary school maintains a dual pre-eminence in both information technology and engineering and seeks to graduate students who will take initiative, step up, and leave the planet better than they found it.

Read More »

Australia's Digital Health Strategy Gets the Nod Without Data Interoperability Controls

Asha McLean | ZD Net | August 7, 2017

My Health Record, the Australian government's e-health record system, has been officially given the green light from the Council of Australian Governments Health Council to automatically sign citizens up to the service, allowing them to opt-out if they choose. By 2018, all Australians will have a My Health Record and by 2022, all healthcare providers will be able to contribute to and use health information in My Health Record on behalf of their patients. They will also be able to communicate with other healthcare providers on the clinical status of joint patients via the digital platform...

Read More »

Banner Health Cyberattack Impacts 3.7 Million People

Joseph Conn | Modern Healthcare | August 3, 2016

Banner Health is contacting 3.7 million individuals whose personal information may have been accessed in a cyberattack that began on systems that process credit card payments for food and beverage purchases at Banner locations. The breach then expanded to include patient and health plan information. The Phoenix-based health system, with locations in Alaska, Arizona, California, Colorado, Nebraska, Nevada and Wyoming, first learned of the attack on July 7, according to a company statement...

Read More »

Barack Obama Puts Cronyism Above Cybersecurity

Michelle Malkin | michellemalkin.com | July 29, 2015

Just last week, the UCLA Health system run by Epic suffered a cyber attack affecting up to 4.5 million personal and medical records, including Social Security numbers, Medicare and health-plan identifiers, birthdays and physical addresses...The university’s top doctors and medical staff market their informatics expertise and consulting services to other Epic customers “to ensure the successful implementation and optimization of your Epic EHR.” Will they be sharing their experience having to mop up the post-cyber-attack mess involving their Epic infrastructure?...

Read More »

Barrett Brown, Political Prisoner Of The Information Revolution

Kevin M Gallagher | The Guardian | July 13, 2013

If the US government succeeds in criminalising Brown's posting of a hyperlink, the freedom of all internet users is in jeopardy Read More »

Bastille

Launched in 2014, Bastille is the leader in enterprise threat detection through software-defined radio. Bastille provides full visibility into the known and unknown mobile, wireless and Internet of Things devices inside an enterprise's corporate airspace-together known as the Internet of Radios. Through its patented software-defined radio and machine learning technology, Bastille senses, identifies and localizes threats, providing security teams the ability to accurately quantify risk and mitigate airborne threats that could pose a danger to network infrastructure. 

Read More »

Behind The Huge Cyberattack Campaign In Latin America That No One Has Heard About

Pawel Kopczynski | Quartz | August 26, 2014

For the past four years, a secret cyber-attack campaign, possibly state-sponsored, has been directed at several Latin American intelligence services, military, embassies and other government institutions. The Moscow-based cyber-security firm Kaspersky Lab, which claims to have unearthed the campaign, has given it a name: El Machete...

Read More »

British Spies Said To Intercept Yahoo Webcam Images

Nicole Perlroth and Vindu Goel | New York Times | February 27, 2014

A British intelligence agency collected video webcam images — many of them sexually explicit — from millions of Yahoo users, regardless of whether they were suspected of illegal activity, according to accounts of documents leaked by Edward J. Snowden. Read More »

Business-Government Ties Complicate Cyber Security

Howard Wen | O'Reilly Radar | February 6, 2012

Are corporate and government interests in the U.S. becoming one and the same? That is, an attack on an American business' network may be regarded as an assault on the country itself?

Read More »

CCSi Awarded VA Contract To Enable Rural-Area Veterans Access to Benefit Systems

Press Release | CCSi, U.S. Department of Veterans Affairs | July 21, 2014

Creative Computing Solutions, Inc. (CCSi), a leading provider of health services, program management, cybersecurity and enterprise systems engineering to the federal government, today announced it has received a prime contract to support the Department of Veterans Affairs (VA) Office of Informatics and Analytics, Health Informatics Office and the Office of Rural Health...

Read More »

CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous

Mark M. Jaycox and Kurt Opsahl | Electronic Frontier Foundation | February 25, 2013

The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »

CISPA Is Dead, Long Live CISPA

Adam Clark Estes | Atlantic Wire | April 25, 2013

After stirring up trouble for months, the Cyber Intelligence Sharing and Protection Act (CISPA) died a quiet death in the Senate on Thursday. Despite the bill's passage in the House, Senators decided to pigeonhole the legislation... Read More »

CISPA Is Dead. Now Let’s Do A Cybersecurity Bill Right

Julian Sanchez | Wired | April 26, 2013

The controversial Cyber Intelligence Sharing and Protection Act (CISPA) now appears to be dead in the Senate, despite having passed the House by a wide margin earlier this month. Though tech, finance, and telecom firms with a combined $605 million in lobbying muscle [updated*] supported the bill, opposition from privacy groups, internet activists, and ultimately the White House [...] seem to have proven fatal for now. Read More »

CISPA Zombie Bill Is Back, With Fewer Privacy Concerns…Maybe?

Dana Liebelson | Mother Jones | October 21, 2013

Sen. Dianne Feinstein (D-Calif.) says the new version of the controversial cybersecurity bill will include "tight limitation on what kind of information is shared." Read More »