The watchdog made several recommendations in an audit of the Cybersecurity Maturity Model Certification effort. The Defense Department needs to improve communication with industry and develop...
Heading into 2022, business leaders and security professionals have many challenges to deal with. According to The Impact of Technology in 2022 and Beyond: an IEEE Global...
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization Act for...
Taking a proactive approach is a critical step in improving the way the government combats threats. One in three cyber incidents strike the public sector and...
Cybercriminals continue to evolve their tactics, developing more sophisticated ways to persistently target the global payments ecosystem. With the disruption of Joker’s Stash, Emotet, Netwalker, Egregor,...
Burnout levels have risen throughout the COVID-19 pandemic. Employees in every industry are reporting burnout, which may lead to apathy and more security risks. In response...
Different cloud environments have different security needs. Here’s how to create a cloud-security scaffolding to strengthen protections while reducing manual support. On-prem data centers, public cloud...
A hacking group, which appears to be a part of the Gaza cyber gang, has been discovered carrying out attacks using malicious Excel 4.0 macros. The...
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers, mobile operators...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed out to...