Russian hackers reportedly exploited a vulnerability in Kaspersky Lab's software to steal sensitive cyberdefense data from a National Security Agency contractor. The incident, which occurred in 2015, involved a contractor who loaded classified information onto his personal computer in order to work at home. The information included hacking tools and other sensitive data that the NSA used to gather intelligenc...
Federal agencies already under the gun to modernize their information technology capabilities have a new set of standards to meet as a result of an executive order President Donald Trump issued this spring. The directive not only will affect agency managers in their IT operations and acquisition act...
Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that stat...
The House Intelligence Committee on Wednesday conducted a hearing focusing on the impact of Russian hacking on the 2016 elections. Members of the committee heard testimony from former DHS Secretary Jeh Johnson, who was in charge of the department when the actual hacking took place during the final m...
Microsoft this weekend unleashed its wrath on the National Security Agency, alleging it was responsible for the ransomware attack that began last week and has spread to thousands of corporate, government and individual computer systems around the world. Microsoft Chief Legal Officer Brad Smith launc...
A major federal acquisition opportunity with a potential contract value of $50 billion for information technology vendors is back on track. The General Services Administration recently resumed processing vendor applications after a legal challenge to the contract was resolved in its favor. As a resu...
Microsoft has called on governments around the world to create a "digital Geneva Convention" as a way to normalize international cybersecurity rules and protect civilian use of the Internet. President Brad Smith, who is also Microsoft's chief legal officer, addressed the issue at the annual RSA co...
Vendors of cybersecurity offerings are finding that the U.S. government is serious about improving the protection of federal IT assets. A steady stream of data protection contracts has been flowing to providers, including some notable high-value transactions during the last half of 2016. One example...
Las Vegas is arguably the gambling capital of the world, but it's also the king city for ransomware, based on recent research. Among the world's nations, the United States ranked highest in ransomware incidents, according to a Malwarebytes report on the prevalence and distribution of extortion apps...
The San Francisco Municipal Transportation Authority, or SF MTA, was hacked on Friday. "You Hacked, All Data Encrypted," was the message reportedly displayed on computer screens at the authority's stations throughout the city. "Contact for Key ([email protected])ID:681 , Enter." Fare payment mach...
Microsoft earlier this week said it had fallen victim to "Strontium," its code name for the Russian hacking group also known as "Fancy Bear," which has been linked to recent attacks on Democratic Party systems. The group launched a spear phishing attack that targeted vulnerabilities in both the Wind...
Hundreds of websites -- including those of biggies such as Netflix, Twitter and Spotify -- on Friday fell prey to massive DDoS attacks that cut off access to Internet users on the East Coast and elsewhere across the United States. Three attacks were launched over a period of hours against Internet p...
The Obama administration on Tuesday indicated it was considering a proportional response to retaliate against Russia for its efforts to influence the U.S. election process. The administration last week officially linked Russian operatives to a series of cyberattacks against the DNC and other organiz...
The U.S. government plans to initiate an updated contracting vehicle for the acquisition of cybersecurity information technologies for federal agencies this month. The purpose of the program is to make it easier and more efficient for federal agencies to obtain cyberprotection services. Specifically...
Federal authorities have been investigating reports that hackers targeted the mobile phones of a handful of Democratic Party staffers. The news follows a series of breaches in recent months that revealed emails and other personal information of party staffers and other Democratic officials. The FB...
Extremely - Personalization is a must. Without it, there's little chance of earning my loyalty.
Relatively - Personalization is a plus, but I do consider other factors when deciding who gets my business.
Minimally - Personalization is now automated and commonplace. Brands must do more to make me feel special to earn my loyalty.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/cloud-services.jpg
https://www.ecommercetimes.com/story/inflation-triggers-retailers-to-reassess-saas-spending-176796.html
Inflation Triggers Retailers To Reassess SaaS Spending
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/cyberwarfare-3.jpg
https://www.ecommercetimes.com/story/holiday-season-sees-onslaught-of-ransomware-ddos-attacks-177544.html
Holiday Season Sees Onslaught of Ransomware, DDoS Attacks
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/multifactor-authentication-2.jpg
https://www.ecommercetimes.com/story/mfa-is-broken-heres-how-to-fix-it-177538.html
MFA Is Broken, Here’s How To Fix It
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/03/online-shopping-cart.jpg
https://www.ecommercetimes.com/story/sink-or-swim-5-e-commerce-pain-points-to-address-for-success-176769.html
Sink or Swim: 5 E-Commerce Pain Points To Address for Success
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/holiday-gift-card.jpg
https://www.ecommercetimes.com/story/why-quality-e-gifts-are-smart-business-decisions-177207.html
Why Quality E-Gifts Are Smart Business Decisions
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/student-computer.jpg
https://www.ecommercetimes.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
Enter your Username and Password to sign in.
Social Media
See all Social Media