Top cyber officials highlighted the importance of defensive measures as lawmakers move on related initiatives, including a bill to identify systemically important critical infrastructure. Making critical...
Officials say there’s a lot agencies and other entities should be doing, even though it may be more than a decade before a quantum computer can...
The commission’s new rule on foreign ownership and investment comes amid an industry call for international alignment on the use of voluntary standards to secure the...
Under a proposed rule, voice service providers would cross reference autodialed calls with numbers on the do not call list to block any robocalls to emergency...
Agencies cannot stop hackers from targeting them. But we can—and should—develop risk management strategies. While serving as the chief information security officer for the U.S. Postal...
Arctic Wolf published findings from a recent global survey of over 1,400 IT decision-makers at enterprise organizations. After a year of high-profile cyberattacks, the survey data...
A more secure government happens when hackers are stopped before they can touch critical data and systems—when a breach is prevented, not mitigated. With government agencies...
Advanced persistent threat actors are becoming harder to spot and making attribution more difficult. Advanced persistent threat actors are making it more difficult to attribute cyberattacks...
The inspector general attributed the delays in the agency’s data at rest encryption program to additional mandates and poor adherence to program management best practices. The...
The bills could be attached to the National Defense Authorization Act. Sen. Mark Warner, D-Va., said he may mix aspects of cybersecurity legislation he introduced over the summer—the...
Recent Comments