A new filing updates the department’s policies on who can access IT systems and data, as well as the fines and prison terms for unauthorized access...
The Open Web Application Security Project (OWASP) has published its draft Top 10 2021 list revealing a shake-up of how modern threats are categorized. In an...
Thoma Bravo announced it has signed a definitive agreement to make a strategic growth investment in Intel 471, a provider of cyber threat intelligence for leading enterprises and...
The documents form a roadmap for agencies to deploy the cybersecurity architectures by the end of fiscal 2024. The federal government is pushing hard for agencies...
Effectively mapping supply chains is a critical national security priority. “Amateurs talk about strategy…Professionals talk about logistics,” said U.S. Marine Corps Gen. Robert Barrow when discussing...
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a...
Allan Friedman, the leader of a transparency initiative at the Commerce Department, is now at the Cybersecurity and Infrastructure Security Agency to realize the ultimate vision...
A vulnerability in collaboration software is undergoing “mass exploitation,” according to U.S. Cyber Command. The Cybersecurity and Infrastructure Security Agency is imploring administrators to apply recent...
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do...
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information. Federal government organizations are storing, accessing and...