Security leaders are facing significant challenges in acquiring the appropriate skills to execute against their strategic objectives. According to research conducted by global cybersecurity recruitment firm Stott and...
Cybersecurity professionals say the board needs subpoena authority in order to be effective. Rob Silvers, the Department of Homeland Security’s under secretary for strategy, policy and...
The committee chair highlighted a need for incident reporting and other requirements for federal contractors. Invoking cybersecurity threats posed by foreign adversaries, the House Oversight and...
Developers have fixed a critical vulnerability in Essential Addons for Elementor, a popular WordPress plugin with more than one million active installations. The security flaw, discovered by Wai...
A third-party data breach has exposed at least 10,000 records held by the British Council, a public sector organization that provides English language courses worldwide. The security incident...
The prospect of a cyberattack amid heightened regional tensions creates a stark contrast against delicate diplomatic efforts the U.S. is pursuing to thwart ransomware criminals officials...
Auditors made 18 recommendations to remediate some of the agency’s longstanding issues. Third-party auditors found deficiencies in the Labor Department’s information security and continuous monitoring controls....
The log management tool Microsoft is marketing as a way for agencies to fulfill administration requirements for network visibility could contribute to a risky ‘monoculture,’ according...
Scammers are trying to steal job seekers’ money and personal information through phishing campaigns using fake advertisements posted on recruitment platforms. The warning was published today as a...
A new phishing campaign is using specially crafted CSV text files to infect users’ devices with the BazarBackdoor malware. A comma-separated values (CSV) file is a text...