The insider threat is not a new risk for security teams, but with ransomware, phishing and myriad other “flashy” external threats targeting organizations, it has been...
The agency plans to keep updating the narrow list based on feedback from cybersecurity professionals. The Cybersecurity and Infrastructure Security Agency released a list of two...
Microsoft has already attributed the broad-scale compromise of its on-premises mail servers to Chinese nation-state actors. The White House will soon officially assign responsibility for an...
Even if your data has not been exposed yet, why not take the time now to protect yourself? The headlines are filled with news about ransomware attacks tying...
The National Institute of Standards and Technology has defined “critical software” in accordance with an executive order to institute procurement standards federal agencies must follow. Some...
In the same way we use a key to lock valuable assets in a safe deposit box, agencies can lock up encryption keys. Deltek’s Federal Cloud Computing...
Threat monitoring and identity access management provider FYEO on Wednesday announced that it emerged from stealth mode with the acquisition of threat intelligence company Intelliagg. The company’s FEYO...
A pilot program is being run out of the Defense Department’s Cyber Crime Center, which is a key part of a strategy to secure the defense...
The two programs would look to increase the pool of cybersecurity experts for the public and private sectors, but with a focus on preparing trainees for...
A group of bipartisan House lawmakers on Thursday introduced legislation to step up cybersecurity literacy and increase awareness among the American public amid a spike in...