The NSA announced at the 2019 RSA Conference in San Francisco this week that it is making its software reverse engineering tool Ghidra available to the public and open source. According to the agency, the project is aimed at making reverse engineering software more attainable with tools designed, among other things, to model processor activity to … continue reading
Knowing that vacationers were looking for information about hiking and camping in national forests, the U.S. Forest Service (USFS) undertook a project to create an Interactive Visitor Map. The USFS hoped to provide visitors with an easy way to discover and explore recreational opportunities across 193 million acres of National Forest System land – including … continue reading
SecurityScorecard’s annual U.S. State and Federal Government Cybersecurity Report was released today, and it paints a very grim picture of the government’s cyber health status. Across all of the industries surveyed, including transportation, retail, and healthcare, government organizations received one of the lowest security scores. Cybersecurity incidents show no signs of slowing down, and as … continue reading
Troy Hunt, a Microsoft regional director and security guru, released 320 million freely downloadable “Pwned Passwords” to shed light on how many real-world passwords have been exposed in data breaches. The service was created after NIST released guidance recommending that user-provided passwords be checked against existing data breaches. “My hope is that an easily accessible … continue reading
Companies are coming together today for the Day of Action to Save Net Neutrality to stress the importance of keeping the Internet open, fast and accessible to all. Change.org is one of these organizations joining the coalition and fighting for the principles that will keep the Internet free from censorship. In addition to joining the … continue reading
Confluent shared its second annual Apache Kafka report this week, which demonstrates a surge in the use of Kafka. The survey also reveals that companies are implementing Kafka for “more accurate and faster decision making, reduced operating costs, improved customer experiences, and reduced risks,” according to the survey. “The results from this year’s Apache Kafka … continue reading
Since data science tasks like forecasting is important to organizations, Facebook decided to open-source Prophet, its forecasting tool available in Python and R. Prophet is for forecasting time series data, and it was open-sourced by Facebook’s Core Data Science team. Prophet is optimized for business forecast tasks that the Facebook team encountered, which typically include … continue reading
The Federal Trade Commission (FTC) recently announced a new competition that challenges the public to create a tool that consumers can use to protect their homes from Internet of Things devices. While contestants can use this opportunity to show off their skills, Flexera Software said this challenge is a “no-win situation,” and that it shouldn’t … continue reading
Gemalto announced today that it will acquire 3M’s identity-management business, which will become a part of the Gemalto Government Programs business. The agreement to acquire 3M’s identity-management business totaled US$850 million, and it includes 3M subsidiary Cogent. The closing of this transaction is expected to start in the first half of 2017. When the acquisition … continue reading
In August, the U.S. government released its long-awaited open-source software policy, and on Nov. 3 it unveiled Code.gov, a portal—itself open source—aimed at helping government agencies share code in order to save taxpayer money and make IT projects nimbler. Tony Scott, CIO of the U.S., made the announcement in a White House blog post: “Built … continue reading
MobileIron released its second edition of the Mobile Security and Risk Review 2016 today as a way to bring awareness to the challenges enterprises have with protecting their data on mobile apps and devices. The review also highlights the increase in mobile attacks and how enterprises are failing to take adequate measures to protect their … continue reading
LinkedIn has open-sourced its URL-Detector Java library, which checks URLs for malware and phishing. LinkedIn wants to detect as many malicious links as it can, so it defines a URL to be anything that can resolute into a real site when typed into the address bar of a browser, according to a blog post. In … continue reading