Those interested will need to go through a Department of Commerce approval process to be eligible to bid on the contract. American vendors could help NATO...
The website seeks to scale the Defense Department’s bug bounty program by attracting additional white hat hackers. The Defense Department’s Directorate for Digital Services—or DDS—announced on...
Citing the threat posed by foreign adversaries, four Republican senators are pushing for a Senate-confirmed assistant secretary to helm Energy’s office tasked with cybersecurity. A group...
Treasury’s Inspector General found the IRS did not meet requirements like malicious code protection and timely risk mitigation. The IRS’s Enterprise Case Management System did not...
Those interested will need to go through a Department of Commerce approval process to be eligible to bid on the contract. American vendors could help NATO...
The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies today to patch security vulnerabilities exploited as zero-days in recent attacks to install commercial spyware...
In 2023, it has never been more critical for CISOs to secure API ecosystems. There are many advantages to APIs. The main benefit is the interconnectivity...
Cyber incident reports will be shared with the agency under the soon-to-be implemented requirements of the Cyber Incident Reporting for Critical Infrastructure Act. Cyber incident reporting...
The Office of the National Cyber Director, the National Space Council and leaders from the private sector laid out next steps to digitally secure the space...
A new info-stealing malware named MacStealer is targeting Mac users, stealing their credentials stored in the iCloud KeyChain and web browsers, cryptocurrency wallets, and potentially sensitive files....