Search for: "Cyber Defense Systems, Inc." Results 121 - 140 of 248
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Sep 2016, 9:56 am by Riana Pfefferkorn
In the wake of the FBI’s efforts earlier this year to force Apple Inc. to decrypt data on a mobile phone used by one of the San Bernardino shooters, Americans are hotly debating whether the U.S. government can or should require companies to design their systems to ensure government access to unencrypted private data. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
  Cyber-attacks involving the theft of intellectual property can result in a company’s immediate or even permanent loss of revenue and reputation; cyber-attacks involving denial of services (such as a website being shut down by nefarious hackers) can disrupt or forever diminish consumer or customer confidence; cyber-attacks involving exfiltration of private company emails can have a tumultuous impact upon senior management and create an international uproar;… [read post]
23 Feb 2018, 10:00 am by Jordan Brunner
S. information systems as an entry point for espionage or other cyber activities. [read post]
14 Aug 2022, 12:01 pm
Embassies in Beijing and Manila; Vice President of Motorola International, Inc.; and a consultant to The Carter Center’s China Village Elections Project. [read post]
” As President Xi Jinping has made clear, China’s overall national security outlook emphasizes the importance of political, economic, territorial, social and cyber security. [read post]
25 Oct 2021, 1:20 pm by Emily Dai
Troy, president and CEO of the Aviation Information Sharing and Analysis Center and former deputy assistant director in the cyber division at the Federal Bureau of Investigation; and Scott Dickerson, executive director at the Maritime Transportation System Information Sharing and Analysis Center. [read post]
17 Mar 2024, 5:42 pm by Cynthia Marcotte Stamer
Change Healthcare Ransomware Attack On February 21, 2024, a ransomware attack executed by the Blackcat1234 ransomware group took control of and shut down the payment, revenue cycle management and related tools and systems of UHG Subsidiary Change Healthcare. [read post]
13 Mar 2012, 12:50 pm by Raffaela Wakeman
The Wall Street Journal’s MarketWatch shares a press release by Advanced Defense Technologies, Inc., identifying the prospect of domestic drone surveilliance proliferation as a reason why it is developing a proprietary antenna system to help its drones sense, detect, and avoid other airborne objects. [read post]
7 Feb 2024, 7:57 am by Karen Gullo
It empowers authorities to compel “any individual” with knowledge of computer systems to provide any “necessary information” for conducting searches and seizures of computer systems. [read post]
1 Feb 2022, 4:08 pm by Ben Vernia
But just as important, the department’s vigorous pursuit of health care fraud prevents billions more in losses by deterring others who might try to cheat the system for their own gain. [read post]
3 Apr 2017, 8:54 am by Jordan Brunner
This document envisions an Air Force where Airmen and autonomous systems work together as a team to meet a variety of challenges currently facing the United States, such as cyber-attacks, anti-access/area denial strategies, and attacks on space-based assets. [read post]
26 Aug 2022, 2:50 pm by Rob Robinson
About Exterro Exterro empowers legal teams to proactively and defensibly manage their Legal Governance, Risk, and Compliance (Legal GRC) requirements. [read post]
28 Feb 2018, 10:00 am by Elizabeth Marshall Anderson
The panel added that the SEC typically prevails on motions to dismiss, even in circuits where the case law initially appears more favorable to the defense. [read post]
12 Apr 2022, 12:09 pm by Rob Robinson
Additional Reading A Running List: Top 100+ eDiscovery Providers Defining Cyber Discovery? [read post]
7 Feb 2022, 9:13 am by Katherine Pompilio
The committee will hear testimony from David Nalley, president of the Apache Software Foundation; Brad Arkin, senior vice president and chief security and trust officer of Cisco Systems, Inc.; Jen Miller-Osborn, deputy director of threat intelligence of Unit 42 at Palo Alto Networks; and Trey Herr, director of the Cyber Statecraft Initiative at the Scowcroft Center for Strategy and Security at the Atlantic Council. [read post]