The management of the government’s IT acquisitions and operations is also on the Government Accountability Office’s biennial high risk list update this year, as it has...
The Department of Health and Human Services issued three new online resources for health care entities to fortify their digital networks. The Department of Health and...
Prosecutors unveiled charges Monday against a “troll farm” and Chinese nationals who worked with a Zoom employee to crash meetings with U.S.-based dissidents. A “secret police...
The bipartisan, bicameral legislation directs CISA to provide primary and secondary schools with more targeted cyber information and resources to combat a rise in ransomware attacks....
The new guidance pushes software and technology manufacturers to take more responsibility for the security of their devices by adhering to secure-by-design and -default principles. A...
A major coordinated effort took down the black market for stolen data, but experts warn the fight to secure data is ongoing. A coordinated federal effort...
In 2023, it has never been more critical for CISOs to secure API ecosystems. There are many advantages to APIs. The main benefit is the interconnectivity...
Several security vulnerabilities were recently addressed by Canonical in both Graphviz and the Linux kernel of Ubuntu. Recent discoveries include null pointer dereference vulnerabilities in Graphviz...
Researchers recently conducted an investigation and uncovered alarming information regarding 13 Facebook pages and accounts. These pages and profiles have been compromised by the threat actors,...
Enhancing collaboration and information sharing with industry partners can help mitigate threats, but concerns remain about the extent to which foreign-made equipment is embedded within the...
Recent Comments