Effectively mapping supply chains is a critical national security priority. “Amateurs talk about strategy…Professionals talk about logistics,” said U.S. Marine Corps Gen. Robert Barrow when discussing...
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a...
Allan Friedman, the leader of a transparency initiative at the Commerce Department, is now at the Cybersecurity and Infrastructure Security Agency to realize the ultimate vision...
A vulnerability in collaboration software is undergoing “mass exploitation,” according to U.S. Cyber Command. The Cybersecurity and Infrastructure Security Agency is imploring administrators to apply recent...
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do...
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information. Federal government organizations are storing, accessing and...
During congressional testimony, cybersecurity firm FireEye pushed for greater liability protections to be included in a draft cyber incident reporting bill. Rep. John Katko, R-N.Y., plans...
A memo for agencies assigns criticality levels to monitoring activities along various categories and sets deadlines for compliance. Federal agencies must immediately begin sharing any relevant...
Fraudsters send out texts or emails falsely warning that the target’s license needs to be updated, is missing information or is expiring. After the COVID-19 pandemic...
Language from the House Armed Services’ cybersecurity subcommittee also proposes testing for non-kinetic attacks, and the creation of an inventory toward ending the use of legacy...
Recent Comments