TSS – Cyber Feed

  • Dragos Announces New 5-Day, Hands-On Industrial Control Systems Cybersecurity Course on ...
    on January 18, 2018 at 2:04 pm

    HANOVER, Md., Jan. 17, 2018 /PRNewswire/ -- Industrial control systems (ICS) cybersecurity company Dragos, Inc. announced today the addition of a new, 5-day ICS cybersecurity course: "Assessing, Monitoring, and Hunting ICS Threats." The course is hosted at Dragos' state-of-the-art training center ... […]

  • Robotic Process Automation will generate nearly two lakh jobs in India by 2021
    on January 18, 2018 at 1:47 pm

    Nearly two lakh Robotic Process Automation (RPA) led jobs are expected to be generated in the country by 2021, Daniel Dines, CEO and Co-Founder of UiPath, a Bangaluru-based software company, said today.India is in prime position to become a RPA powerhouse because of its growing talent pool and cost advantage, Dines said in a company release here.RPA has been gaining traction as a way of automating repetitive, tedious tasks to handle higher-value analysis and decision-making, he said."India is reaping the benefits of a new genre of jobs created from RPA. The Indian mind is apt for this technology," he added."Indians have the right ability for workarounds and out-of-the-box thinking that works well for RPA. So we see a great pool of RPA talent emerging from the country," Dines said.RPA will help build India's middle class, he said adding currently only one per cent of the Indian population earns above $20,000 a year."RPA is right now creating jobs that will push a higher percentage of the population into this segment," he added. […]

  • Palo Alto Networks opens new office in Tel Aviv
    on January 18, 2018 at 12:07 pm

    New site to house development teams and other functions, which are expected to see growth, US cybersecurity firm says […]

  • Globe Telecom looks at global best practices in fight vs. illegal sites, child pornography
    on January 18, 2018 at 11:02 am

    Globe Telecom looks at global best practices in Singapore and other countries in its fight against illegal sites and child pornography in order to protect the rights of young Filipino boys and girls who are most susceptible to exploitation and abuse. The island-state currently regulates the presence of objectionable content and conduct online through its Internet Service Providers (ISPs) as enabled by the Computer Misuse and Cybersecurity Act and carried out by Singapore's Media Development Authority. A list of 100 websites are banned including a site that allegedly recruited underage boys for sex and nude photography. In the Philippines, the Anti-child Pornography Act of 2...Keep on reading: Globe Telecom looks at global best practices in fight vs. illegal sites, child pornography […]

  • West Side News & Notes
    on January 18, 2018 at 5:48 am

    According to officials, Beckwith is a recognized expert on cybersecurity, policy and cyberterrorism and is trained in computer forensics, network investigations and network intrusion response. In addition to the video training, the Ohio Auditor’s office ... […]

  • Cyber Attacks Will Continue to Succeed
    on January 18, 2018 at 5:12 am

    Spectre and Meltdown demonstrate weaknesses in current hardware cybersecurity that will force a paradigm shift within the semiconductor industry. […]

  • Booz Allen Awarded $165M Cybercom Support Contract
    on January 18, 2018 at 2:16 am

    Booz Allen Hamilton (NYSE: BAH) has received a potential five-year, $165 million contract from the General Services Administration to provide support services to the U.S. Cyber Command. GSA’s Federal System Integration and Management Center issued ... […]

  • Daniel Craig's James Bond Movies Are So Boring
    on January 18, 2018 at 1:36 am

    But for all his cyberterrorism knowledge, Silva’s big plan is to simply shoot at M in Parliament. Bond helps repel the attack and takes M to Skyfall Lodge, his family estate in the Scottish Highlands, where Bond and the groundskeeper (Albert Finney ... […]

  • Booz Allen Hamilton Receives $165 Million Deal To Support Cyber Command
    on January 17, 2018 at 10:26 pm

    Booz Allen Hamilton [BAH] has received a five-year, $165 million contract to provide support services to U.S. Cyber Command. Under the deal, Booz Allen will assist Cyber Command with planning and policy support, as well as training and command administrative assistance. “Today, the tools and technology needed to carry out a large-scale cyber-attack are getting […] The post Booz Allen Hamilton Receives $165 Million Deal To Support Cyber Command appeared first on Defense Daily Network. […]

  • Commerce Agency, Energy Sector Collaborating On Cyber Protections
    on January 17, 2018 at 6:35 pm

    A Commerce Department agency, energy sector and technology providers are partnering in a new initiative aimed at finding solutions for protecting critical assets used in the generation, transmission and distribution of power. The National Cybersecurity Center of Excellence (NCCoE), part of Commerce’s National Institute of Standards and Technology, has initiated a new project, Energy Sector Asset […] The post Commerce Agency, Energy Sector Collaborating On Cyber Protections appeared first on Defense Daily Network. […]

  • Applying Blockchain to Cybersecurity
    on January 17, 2018 at 10:10 am

    Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful. […]

  • Cyber attack damage could cost as much as Hurricane Katrina
    on January 17, 2018 at 9:43 am

    A cyber attack against a major cloud computing firm could cause as much financial damage as Hurricane Sandy or Hurricane Katrina, the World Economic Forum and risk manager Marsh have warned. Increasing numbers of businesses and individuals rely on cloud ... […]

  • Action1 Launches Free Cloud-based Endpoint Security Platform Arming Small Businesses with Instant Threat Detection and Response Capabilities.
    on January 17, 2018 at 7:01 am

    "We live in the modern reality of ever increasing threats to cybersecurity and growing levels of cyberterrorism," said Maurice Torres, VP of Product Strategy at Action1 Corporation. "Quickly disappearing concept of old-day perimeter security, diminished by ... […]

  • Cloud computing: Why a major cyber-attack could be as costly as a hurricane
    on January 17, 2018 at 6:58 am

    Video: 10 key strategies for disaster preparedness and increased IT security Ransomware: An executive guide to one of the biggest menaces on the web Everything you need to know about ransomware: how it started, why it's booming, how to protect against it ... […]

  • As America’s Nukes and Sensors Get More Connected, the Risk of Cyber Attack Is Growing
    on January 17, 2018 at 5:42 am

    Future nuclear weapons will be more sophisticated and better integrated with other equipment. That has benefits and drawbacks. […]

  • Halliburton Company VP, Bill Sanstrom, Joins IronClad Encryption's Advisory Board
    on January 17, 2018 at 3:54 am

    That product line is desperately needed given the active cyberattacks and cyberterrorism campaigns directed at U.S. infrastructure, including oil rigs and pipelines, by nation state sponsors. Last year, IronClad Encryption announced that it is co ... […]

  • HID Global to Collaborate with ThreatMark on its New Cyber Threat Solutions for Banking and Finance Sectors
    on January 16, 2018 at 6:21 pm

    it_securityID Global®, a worldwide leader in trusted identity solutions, today announced that it has signed a collaboration agreement with ThreatMark, a threat and fraud detection technology company, to develop new capabilities that will enhance the ability of financial institutions to detect cyber threats, such as malware, application hacking, phishing, account takeover, identity theft and fraudulent transactions. HID’s expertise in Identity & Access Management (IAM) includes multi-factor authentication, credential management system software and identity verification capabilities in complex environments. HID’s capabilities complement ThreatMark’s expertise in cyber-criminal detection and fraud prevention. The two companies will work together to extend threat and fraud detection in order to meet today’s ever-increasing risk from cyber attacks. “With cyber threats continuously evolving, HID Global is committed to advancing and extending our threat detection capabilities,” said Martin Ladstaetter, Vice President Products for IAM Solutions at HID Global. “Working with ThreatMark not only provides a partnership with a very successful company with domain know-how, but it also gives us visibility into an even broader attack surface that needs to be addressed, ensuring that we are staying ahead of cyber threats today and in the future.”“Collaborating with HID gives ThreatMark the opportunity to combine our expertise to improve the overall security ecosystem through threat and fraud detection,” said Michal Tresner, CEO ThreatMark. “ThreatMark has differentiated itself by providing innovative deep behavioral profiling  technology that, together with advanced analytics, can help to understand how cyber-criminal work. Collaboration with companies like HID Global allow us to broaden our reach and develop better integrated solutions.”   HID Global provides the broadest range of market-leading IAM solutions as the only company that can truly deliver a converged physical and logical identity management solution for high assurance and multi-factor authentication. ThreatMark’s solution integrated with HID Global’s portfolio for securing both consumer and employee transactions in banking and finance will greatly enhance security while maintaining a frictionless user experience that is important to the banking industry. About HID GlobalHID Global powers the trusted identities of the world’s people, places and things.  We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and over 2 billion things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet. Headquartered in Austin, Texas, HID Global has over 3,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com.  About ThreatMarkThreatMark is highly specialized research and development laboratory combining hacker level security know how with latest machine learning technology to combat cyber threats and online fraud. ThreatMark’s research into malware detection, artificial intelligence and behavioral biometry, is applied into the production environment of global banks, lending and payment providers and other online businesses that trust ThreatMark during their everyday operation.ThreatMark solutions are designed to address the weakest link in security – the human factor. By monitoring subtle changes of the complex human behavior during their online business interactions even the stealthiest cyber-attack or fraud attempt can be identified and mitigated in the real-time. To learn more please visit www.threatmark.com# # #Article Locations: HomepageArticle Type: Today's NewsMarket Sectors: Federal | Agencies | LegislativeInfrastructure ProtectionLaw Enforcement | First RespondersState | Local SecuritySecurity ServicesTechnology Sectors: Access Control | IdentificationCyber SecurityCommunicationsIT Security […]

  • Preparing for NIS - Europe's First Dedicated Cybersecurity Law
    on January 16, 2018 at 4:24 pm

    In May of this year, an important new European law will come into force which will affect providers of networking and operational technology (OT) systems in vital sectors such as energy, healthcare and finance across the continent. read mor […]

  • Time to Get Serious about Hardware Cybersecurity
    on January 16, 2018 at 3:51 pm

    The Meltdown and Spectre vulnerabilities should be the kick in the pants that moves the US government past wishful thinking. […]

  • BlackBerry Launches Security Product for Automotive, Other Industries
    on January 16, 2018 at 3:21 pm

    BlackBerry announced on Monday the launch of Jarvis, a new cybersecurity service designed to help companies in the automotive and other sectors find vulnerabilities in their software. read mor […]

  • Cybersecurity firm: US Senate in Russian hackers’ crosshairs
    on January 16, 2018 at 1:57 pm

    “The same Russian government-aligned hackers who penetrated the Democratic Party have spent the past few months laying the groundwork for an espionage campaign against the U.S. Senate, a cybersecurity firm said Friday.” Source: Cybersecurity firm: US Senate in Russian hackers’ crosshairs […]

  • What Are the Implications of Meltdown and Spectre for IoT?
    on January 16, 2018 at 6:01 am

    Less than a week into 2018 and security researchers at the Project Zero team at Google were announcing the discovery of security vulnerabilities, Spectre and Meltdown. Several international research teams discovered the flaws over the last six months but it took a while for the news to go public. I spoke to Jason McNew, Founder and CEO of Stronghold Cybersecurity, and Kayne McGladrey, IEEE Member, director of information security services at Integral Partners to find out more. A Brief Rundown of Meltdown and Spectr […]

  • Cyber-attack shuts down US Regional Hospital's online system
    on January 16, 2018 at 5:42 am

    A cyber-attack that left computer screens at Hancock Regional Hospital in Greenfield, Indiana, USA, with a ransom message for bitcoin has caused the entire network at the hospital to go offline to stop damage to data of the patients. A cyber-attack that ... […]

  • Incident messaging for cyber attack response
    on January 16, 2018 at 1:27 am

    Cyber breaches don’t just impact on internal systems they can quickly escalate into major reputational crises; so how can your business prepare to respond when under attack? Chris Butler provides some pointers... To quote Warren Buffet, it takes 20 years ... […]

  • BlackBerry launches cybersecurity product called Jarvis to stop driverless cars getting hacked
    on January 15, 2018 at 11:26 pm

    The software is called Jarvis and it identifies vulnerabilities in software used in cars. […]

  • BlackBerry launches cybersecurity software for self-driving cars
    on January 15, 2018 at 9:05 pm

    (Reuters) - Canadian software maker BlackBerry Ltd on Monday launched a new cybersecurity software, which identifies vulnerabilities in programs used in self-driving cars. […]

  • Tech Talk: Cyber Attacks Will Remain A Hot Topic In 2018
    on January 15, 2018 at 5:26 pm

    In terms of cybersecurity, 2018 does not appear to be off to a great start and looking back over the past year, it’s easy to see why cyber attacks have been such a big topic in the news. At only a few days into the new year, many leaders in the industry ... […]

  • Research report explores the Global defense drones market forecast 2016-2022
    on January 15, 2018 at 2:31 am

    This market research report offers a complete breakdown of the global Defense Drones market through exhaustive information on industry-authenticated market data, facts, statistics, and insights. An apt set of approaches and suppositions in the report back ... […]

  • The state of Israel’s cybersecurity market
    on January 14, 2018 at 8:30 pm

     The Equifax breach, WannaCry, NotPetya, the NSA leak, and many more cyber incidents – 2017 was certainly a busy year for hackers, illustrating yet again just how vital innovative cybersecurity solutions are in the fight against cyber threats. Second only to the U.S., in terms of cybersecurity investment 2017 was another excellent year for Israeli cybersecurity startups, with dozens of… Read Mor […]

  • Phifer swept up in cyber attack
    on January 14, 2018 at 8:10 pm

    Since using an exploratory motorcycle tour of the 8th District last year to launch herself into a full-fledged campaign, Leah Phifer has been on the move. As such, her story of coming to politics from working for the federal government in counter-terrorism ... […]

  • The Case for Cybersecurity Certifications
    on January 14, 2018 at 3:36 pm

    JB: With rampant malware attacks, threats of a cyberwar and increasing chaos in the global politics serving as rude reminders to the disastrous potential of cyberthreats — even worse — of cyberterrorism, we see a lot more individuals, organizations and ... […]

  • Ben Sasse presses Jeff Sessions on cybersecurity after Senate hack report
    on January 14, 2018 at 1:59 pm

    The U.S. intelligence community has blamed the 2016 breaches on Russian President Vladimir Putin, and Mr. Sasse said he fears the Kremlin could be ... “Moscow wants to undermine America's trust in our institutions and Putin couldn't be happier with Washington's obsession with making everything ... […]

  • Israeli premier on 6-day visit to India to deepen ties
    on January 14, 2018 at 6:55 am

    Author: ASSOCIATED PRESSSun, 2018-01-14 03:00ID: 1515912160622249000NEW DELHI: Israeli Prime Minister Benjamin Netanyahu is beginning his first visit to India to promote defense, trade and energy ties. Netanyahu arrives Sunday for a six-day visit. On Monday, he’ll meet Prime Minister Narendra Modi and call on President Ram Nath Kovind as well as attend an India-Israel CEO Forum Meeting. India’s External Affairs Ministry says the two countries are expected to sign agreements on cybersecurity, energy and space cooperation and film production. Israel and India have developed close ties in high-tech and defense cooperation. Main category: Middle-EastTags: IsraelIndiaBenjamin NetanyahuNarendra Modirelated_nodes: Indian, Pakistani troops exchange fire across military control line in Kashmir (Source: Xinhua)Israel carries out air strike in Gaza […]

  • Japan PM beefs up European ties amid North Korea tensions
    on January 13, 2018 at 3:43 pm

    Maruyama added that given the threats posed by cyberterrorism “we need to have closer coordination among the countries that share the same values. “I think that the NATO center provides us with a kind of information and a way we can cooperate together ... […]

  • Sasse presses Sessions on federal cybersecurity after Senate hack report
    on January 13, 2018 at 2:00 pm

    ... Russian government recently created malicious websites mimicking the Senate's internal email service in a likely bid to steal legitimate log-in credentials in a manner similar to how cybercriminals compromised Democratic targets during the 2016 U.S. presidential race. The U.S. intelligence community ... […]

  • Japan PM increases European ties amid North Korea tensions
    on January 13, 2018 at 7:54 am

    Maruyama added that given the threats posed by cyberterrorism “we need to have closer coordination among the countries that share the same values”. […]

  • Japan PM beefs up European ties amid N Korea tensions
    on January 13, 2018 at 2:12 am

    Maruyama added that given the threats posed by cyberterrorism “we need to have closer coordination among the countries that share the same values. “I think that the NATO centre provides us with a kind of information and a way we can cooperate together ... […]

  • What the next generation of car dashboards will be like
    on January 12, 2018 at 11:48 pm

    The future of the car is driverless. Everyone knows this, and it was on full display at CES 2018, with a host of companies showing off why their particular flavor of self-driving was better than the company just a few feet over on the Las Vegas Convention Center parking lot. The thing is, true self-driving cars — ones that can drive on any street and take you door to door — are likely still several years away. The not as revolutionary but more immediate trend in automotive technology that will change the way we drive in the next few years are connected cars. SEE ALSO: 3 security issues facing self-driving cars Read more...More about Google, Amazon, Ces, Toyota, and Alexa […]

  • Abe wins cybersecurity support in meeting with Estonian leader Juri Ratas
    on January 12, 2018 at 11:44 pm

    Maruyama added that given the threats posed by cyberterrorism “we need to have closer coordination among the countries that share the same values. “I think that the NATO center provides us with a kind of information and a way we can cooperate together ... […]

  • Cybersecurity firm: US Senate in Russian hackers' crosshairs
    on January 12, 2018 at 10:26 pm

    PARIS — The same Russian government-aligned hackers who penetrated the Democratic Party have spent the past few months laying the groundwork for an espionag […]

  • Senators, staffers are next on Russia's cyber hit list, says report
    on January 12, 2018 at 9:49 pm

    A report from cybersecurity firm Trend Micro says Russian hackers are gearing up to attack the U.S. Senate. […]

  • Endgame Endpoint Protection Platform Wins Contract with U.S. Navy to Protect Critical Assets
    on January 12, 2018 at 8:05 pm

    cyber_securityImage Caption: ARLINGTON, Va. -- Endgame, the leader in endpoint protection against targeted attacks, today announced it has won a sole source contract with the U.S. Navy to safeguard endpoints from global attackers. As part of this agreement, the Navy, specifically the U.S. Fleet Cyber Command/U.S. Tenth Fleet, will receive Endgame's endpoint protection platform to prevent, detect and respond, and hunt for advanced threats to protect critical infrastructure."Endgame is honored to enter this partnership with the U.S. Navy," said Nate Fick, Endgame CEO. "The Navy is widely known as being on the cutting-edge of cybersecurity defenses, and we were happy to exceed their protection requirements during this competitive process. Safeguarding the most targeted organizations across the Department of Defense is an important part of our mission, and we look forward to continuing it with the Navy."The U.S. Fleet Cyber Command/U.S. Tenth Fleet will leverage Endgame to protect the entire Navy, including more than 500,000 computers and ships' hull, mechanical and electrical systems, weapons and navigation systems, aviation systems, and the technology controlling physical devices on bases and facilities. U.S. Fleet Cyber Command/U.S. Tenth Fleet's  mission is to "serve as the Numbered Fleet for Fleet Cyber Command and exercise operational control of assigned forces; to direct and deliver tactical and operational effects in and through cyberspace, space, and the electromagnetic spectrum to Navy commanders worldwide and ensure successful execution of Fleet Cyber Command assigned mission areas."Endgame credits this contract win to its heritage protecting the federal government, including the U.S. Air Force, from targeted attacks. Endgame is rapidly becoming the standard endpoint protection platform across the Department of Defense due to its layered protections and ease of use for inexperienced analysts. As the need for more sophisticated protections has expanded into the commercial sector, Endgame's commercial customer base has grown rapidly, including in critical industries like financial services, healthcare and education. With Endgame, users of any skill level can prevent, stop, and proactively hunt ongoing threats that bypass incumbent security solutions.The Navy chose Endgame primarily because of its ability to protect against targeted attack techniques and technologies outlined in the MITRE ATT&CK™ Matrix. The MITRE Corporation recently validated Endgame protections across the breadth and depth of the Matrix during a nation-state emulation exercise. Endgame will continue to work with MITRE to redefine the scope of endpoint protection to ensure technologies are truly effective against modern attacks. About EndgameEndgame's converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.Article Locations: HomepageArticle Type: Today's NewsMarket Sectors: Maritime | Port SecurityTechnology Sectors: Cyber Security […]

  • Raytheon awarded contract worth more than $1.5 billion for additional Patriot™ integrated air and missile defense capability
    on January 12, 2018 at 6:57 pm

    military_force_protectionANDOVER, Mass.,-- Raytheon Company [NYSE: RTN] announced today it has been awarded a new, direct commercial sales contract worth more than $1.5 billion to provide additional Patriot Air and Missile Defense system capability to a member of the 14-nation Patriot partnership. The contract was awarded on Jan 4, 2018. Details on the specific contracting country were not disclosed. Raytheon's Patriot™ is a missile defense system consisting of radars, command-and-control technology and multiple types of interceptors, all working together to detect, identify and defeat tactical ballistic missiles, cruise missiles, drones, advanced aircraft and other threats. Patriot is the foundation of integrated air and missile defense for 14 nations. About RaytheonRaytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.Article Locations: HomepageArticle Type: Today's NewsMarket Sectors: Military | Force Protection […]

  • Japan PM Shinzo Abe beefs up European ties amid North Korea tensions
    on January 12, 2018 at 6:46 pm

    Maruyama added that given the threats posed by cyberterrorism "we need to have closer coordination among the countries that share the same values. […]

  • Cybersecurity: The Do's and Don'ts
    on January 12, 2018 at 6:01 pm

    Security is the responsibility of all of us. Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness have become very important topics. What’s enabling most cybercrimes is simple human error, such as trusting instructions that are sent electronically, or being taken in by complex scams in which criminals pose as clients, vendors, employees, executives, or other professionals in order to gain access to financial assets. For this reason, we’ve comprised a list of do’s and don’ts when it comes to cybersecurity. […]

  • With North Korea in Mind, Japan’s Abe Strengthens Ties to Europe
    on January 12, 2018 at 5:11 pm

    Maruyama added that given the threats posed by cyberterrorism “we need to have closer coordination among the countries that share the same values. “I think that the NATO center provides us with a kind of information and a way we can cooperate together ... […]

  • Google says Spectre and Meltdown were the worst vulnerabilities in a decade
    on January 12, 2018 at 11:52 am

    Now that the patches across various platforms for the recently discovered Spectre and Meltdown vulnerabilities have largely been deployed, Google has detailed how it managed to address these threats on its cloud services such as Gmail and Search before the public even knew about them. Hint: It wasn't easy.  In a lengthy blog post Thursday, Google's VP of 24/7 operations Ben Treynor Sloss explains how tough these security holes were to patch, and how long it took Google to fully fix all of them, even though it was Google's own Project Zero team that had discovered them.  SEE ALSO: Spectre and Meltdown are a danger for your bitcoins, but there are ways to keep them safe Read more...More about Google, Cybersecurity, Spectre, Infosec, and Meltdown […]

  • Russian hackers who hacked DNC are now targeting U.S. Senate: Experts
    on January 12, 2018 at 11:46 am

    1/12/18 The Russia connection Enable IntenseDebate Comments:  Enable IntenseDebate Comments mso-bidi-font-family:"Times New Roman";mso-bidi-language:HE">In a report cybersecurity firm TrendMicro posted on its website Friday, read mor […]

  • Mariya Gabriel: The Bulgarian Presidency will Conduct the Cyber Security Talks
    on January 12, 2018 at 8:43 am

    During the European Presidency, Bulgaria will have a crucial role to play in the subject of the Audiovisual Services Directive for the Protection of Minors and will lead to scrutiny on cybersecurity. This is what Mariya Gabriel, European Commissioner for Digital Economy and Society, the initiator for introducing Europe's supercomputers, commented in the TV show "The Day Begins" on BNT. She also commented that the EC has made a historic decision and the goal is to be implemented by 2022. In the studio of the Bulgarian National Television, Mariya Gabriel announced that a pilot project for free wireless internet in public places in Europe will launch in a month and will initiate a pilot project to create a network of centers of excellence in the EU member states. "Supercomputers means much faster to develop drugs, medicine, early diagnosis and treatment to be more personally oriented. It means much faster to know the climate problems, to be able to anticipate as quickly as possible shocks, earthquakes that allow people to evacuate in time and save lives. It means certain production cycles to be reduced, higher security, more cybersecurity technologies, encryption, privacy and suspicious behavior, "Gabriel explained. The Bulgarian commissioner commented that digital skills are its top priority and in the words? At present, 80 million from 500 million Europeans have never used the Internet, 169 million have no basic digital skills. On this occasion, the EC has provided training to nearly 7 million Europeans and launched a Digital Opportunities project aimed at young people to enable between 5-6 thousand young people in Europe to carry out a 4.5 month internship in another EU country. Students who are not IT specialists. The Horizon 2020 program for the first time is a project in which Europe works directly with municipalities and intermediary organizations. Maria Gabriel also said that there are 24 EC legislative initiatives in the digital single market area, of which only 11 have been finalized. […]

  • Cybersecurity firm says US Senate in Russian hackers’ crosshairs
    on January 12, 2018 at 5:25 am

    The same Russian hackers who penetrated the Democratic Party have been laying the groundwork for an espionage campaign against the Senate. […]