The new definition allows industry more flexibility to decide what should trigger reporting mandates for the sector. The Transportation Security Administration has changed the criteria pipeline...
Aleksandr Grichishkin, 34, pleaded guilty to providing a server allowing cybercriminals temporary use of IP addresses to bypass security measures and exploit financial data. A U.S....
The volume of information leaked by ransomware-abusing cybercriminals through data leak sites has grown by a factor of 10 in only 12 months, according to threat intelligence firm...
Federal cybersecurity officials would prefer you keep your holidays a little more secure. Over the Thanksgiving holiday, my good friend Michael Bechetti texted me a funny...
The agency is ramping up efforts to exercise its new authorities to hunt for threats across the .gov enterprise. The Cybersecurity and Infrastructure Security Agency is...
The Government Accountability Office says CISA should also update its approach to communications sector reliability by securing the supply chain for information and communications technology. The...
As part of the Enduring Security Framework (ESF), the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published guidance to mitigate cyber...
Most businesses and consumers today prefer digital channels as their preferred method of communication. We rely on things like email so much for example, that when...
A notorious group of hackers has been found targeting customers of banks with phony fraud alerts and stealing thousands of dollars from their bank accounts. The...
Russia and China continue to engage in IP theft to bolster their defense technology and economic standing, respectively. The National Counterintelligence and Security Center urges action....