The bill leaves it up to an interagency rulemaking process to determine whether entities would be required to report incidents they’re aware of but not directly...
The details of a second set of security regulations will not be released publicly. The public will not be privy to the details of a second...
Along with insider threats related to a potential “Great Resignation,” Netskope report covers increased cloud application security risks, from malware delivery to third party plugins Netskope revealed...
The White House said it’s accusing China with “high confidence.” The Biden administration and a group of allies on Monday attributed the Microsoft Exchange server attack...
The Federal Bureau of Investigation (FBI) warns of threat actors potentially targeting the upcoming Olympic Games, although evidence of attacks planned against the Olympic Games Tokyo...
The app was recently migrated into a VA-managed cloud environment and needs a new authority to operate and some upgrades. A tool designed to protect the...
A recent study from Security Compass found just 25% of organizations surveyed conduct threat modeling during the early phases of software development—requirements gathering and design—before proceeding with application...
While some organizations are improving their ability to share cyberthreat intelligence with other entities within the same sector, cross-sector cyber intelligence collaboration is still difficult. But...
Eyes now turn to the Office of Management and Budget to issue requirements for federal agencies and contractors based on NIST’s work. The National Institute of...
As Congress considers how to increase competition for app stores run by Apple, Google and others, it also needs to consider potential cybersecurity threats. As more...