With ransomware hackers varying their targets to include operational technology used by U.S. factories and manufacturers, is an OT executive order needed to help combat them?...
The idea sprung from a sense of moral outrage Cybersecurity and Infrastructure Security Agency Director Jen Easterly identified with. Cloud service providers should not be allowed...
The federal government needs to improve its information security to keep pace with the dynamic threats to federal networks and supply chains. On Oct. 2, the...
Officials stressed the importance of maintaining a bill of materials for software in flagging the “Log4j” vulnerability. The Cybersecurity and Infrastructure Security Agency has added a...
The threat group, first identified in June, focuses solely on data exfiltration and subsequent extortion, and has already targeted 40 victims since September. There is a...
Officials in the public and private sectors warned of the need to enact a robust cybersecurity posture at the federal level ahead of growing ransomware and...
Cloud sprawl happens when development teams spin up new cloud resources, forget about them, then move on to the next urgent task. Migrating to the cloud...
The watchdog made several recommendations in an audit of the Cybersecurity Maturity Model Certification effort. The Defense Department needs to improve communication with industry and develop...
The update will include a focus on supply chains for both hardware and software. The National Institute of Standards and Technology is preparing to again update...
Heading into 2022, business leaders and security professionals have many challenges to deal with. According to The Impact of Technology in 2022 and Beyond: an IEEE Global...
Recent Comments