Sen. Gary Peters discussed how streamlined reporting to CISA can clarify the cyber threat landscape to all U.S. networks. U.S. government digital systems and infrastructure can...
Legislation seeking to amend the annual National Defense Authorization Act wants the Government Accountability Office to investigate. A new public-private body within the Department of Homeland...
CISA Director Jen Easterly said industry concerns shouldn’t preclude use of the commission’s regulatory authority to mitigate exploitation of the Border Gateway Protocol. The Federal Communications...
A key lawmaker on the House Homeland Security Committee wants more details on what was breached and what was lost when the SolarWinds Orion platform was...
As the agency finalizes guidance for approving the sale of devices such as those used to monitor and control glucose levels, the comments highlight competition and...
Officials are connecting the “Maui” ransomware to attacks on the public health sector over the past year. State-sponsored actors from North Korea are behind a lesser-known...
A recent attack on a rare-earths processor shows a new facet of information warfare: weaponized NIMBYism. A Chinese disinformation effort against a Pentagon contractor building a...
The Microsoft program—PowerShell—has granted malicious actors in major hacks remote command and control ability over victims, but, by the same token, it can improve cybersecurity management...
Almost one in three detected Russian attacks are successful, Microsoft said. Four months into its war on Ukraine, Russia is carrying out cyber operations on much...
Through new enforcement and reporting efforts, the Justice Department is attempting to curb online harassment, especially related to vulnerable populations. The Justice Department announced the creation of a...
Recent Comments