article thumbnail

DoD Announces Third 'Hack the Pentagon' Bug Bounty Program

SecureWorld News

Department of Defense (DoD) is turning to the private sector to bolster its cyber defenses with the launch of the third iteration of its "Hack the Pentagon" bug bounty program. These firms will host crowdsourced security activities on behalf of the DoD. The Contractor shall perform to the standards in this contract.".

article thumbnail

Tech Moves: F5 adds CTO and HR chief; Adaptive names CFO; Techstars Seattle leaders depart

GeekWire

Anand is the former chief technology officer and chief information security officer at Imperva, a cybersecurity company recently acquired by Thales. He previously co-founded Prevoty, which was acquired by Imperva in 2018, and led technology efforts at BBC and NASA’s Jet Propulsion Laboratory. Sarah Studer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dunkin Donuts Forced to 'Fill Security Holes' in Data Breach Settlement

SecureWorld News

But the holes in the company's cybersecurity program are expensive. Now the company is being forced to take certain information security measures and pay a $650,000 fine to the state of New York. Dunkin's donut holes are delicious. Dunkin' Donuts cybersecurity lawsuit details.

article thumbnail

Seattle cybersecurity startup that aims to protect machine learning-based code lands $13.5M

GeekWire

Protect AI , a Seattle startup that sells cybersecurity tech tailored to code that powers artificial intelligence and machine learning programs, emerged from stealth mode and announced $13.5 After that, he founded DataScience.com, a cloud workspace platform that was acquired by Oracle in 2018. Protect AI CEO and co-founder Ian Swanson.

Oracle 73
article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

W illiam Lidster has been with AAA Washington since August of 2017, serving as the leader of its information security an d compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.

article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

In 2018, an account belonging to an external user was compromised and used to steal approximately 500 megabytes of data from a major mission system.". 6 key areas where NASA's information security is failing. NASA lacked an Agency-wide risk management framework for information security and an information security architecture.

article thumbnail

Hottest tech skills to hire for in 2020

Hacker Earth

Here are some of the hottest tech skills (a mix of programming languages, tools, and frameworks; in random order) to hire for in 2020, which will help you thrive in the workplace of tomorrow. JavaScript has been the fastest-growing and the most sought-after programming language for years. Information security software developers.