A Defense Department official said DOD’s 5G prototyping is also examining the benefits of hardware and software bills of materials to scrutinize the supply chain. The...
House Oversight Committee leaders want to know what vulnerabilities remote-access software introduced and whether agencies mitigated them. As employees—including the federal workforce—start going back to the...
The White House has issued an open letter to companies, urging them to take immediate steps to prepare for ransomware attacks, following a string of cyberattacks...
The department’s inspector general also found vulnerabilities in the department’s technology due to poorly defined patch management roles and configuration settings. The Continuous Diagnostics and Mitigation...
A bigger budget has its numerous benefits but it doesn’t magically scale teams or thwart threats. Today’s cybersecurity landscape can be described as tumultuous at best. The...
The agency also shared how it’s thinking about defining “critical software,” which is to be prioritized under the order. The National Institute of Standards and Technology...
The action demonstrates the department’s authorities beyond attributing malicious cyber activity. The day after Microsoft flagged an intrusion into the U.S. Agency for International Development, Justice...
One high-profile expert raised the ever-looming workforce challenge in suggesting the juice might not yet be worth the squeeze. The National Telecommunications and Information Administration is...
Russian coders have little choice but to work with their government, which in turn denies any knowledge of their activities. That’s why hacking activity shows no...
As agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology. The COVID-19 pandemic has forced many organizations to adapt to...