The program is in limbo while the tool awaits an ATO, prompting the inspector general’s office to express its “concerns.” The inspector general for the Federal...
The federal grant funding can be used to pay for identity verification services, cybersecurity, or other expenses related to fraud detection. Fraudsters were busy during the...
The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices. The Department of Homeland Security will conduct...
President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively mitigate cyber risk. Increasing and enhancing...
The memo follows up President Joe Biden’s executive order in May. Federal agencies have 60 days to identify critical software in their systems and one year...
A cyberespionage group has been discovered targeting critical infrastructure organizations based in Southeast Asia. The threat group is apparently based in China and interested in exploiting...
Remote work promises to make the workforce more responsive and efficient, but it also presents significant security challenges, a former ODNI cyber chief says. While telework...
The White House is working on plans to roll out new cryptographic systems that will require epic levels of funding from Congress and coordination, both within...
Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp. End-to-end encryption is technology that scrambles messages...
Executive Summary Cloud environments are more susceptible to attacks today than they were at the end of last year, according to new research from Unit 42....
Recent Comments