The department’s inspector general also found vulnerabilities in the department’s technology due to poorly defined patch management roles and configuration settings. The Continuous Diagnostics and Mitigation...
A bigger budget has its numerous benefits but it doesn’t magically scale teams or thwart threats. Today’s cybersecurity landscape can be described as tumultuous at best. The...
The agency also shared how it’s thinking about defining “critical software,” which is to be prioritized under the order. The National Institute of Standards and Technology...
The action demonstrates the department’s authorities beyond attributing malicious cyber activity. The day after Microsoft flagged an intrusion into the U.S. Agency for International Development, Justice...
Russian coders have little choice but to work with their government, which in turn denies any knowledge of their activities. That’s why hacking activity shows no...
As agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology. The COVID-19 pandemic has forced many organizations to adapt to...
The president’s funding proposal also puts numbers on the National Cyber Director’s Office and other priority cybersecurity areas. The White House is asking Congress to appropriate...
What would happen if companies stopped paying ransoms? It took little over two hours for hackers to gain control of more than 100 gigabytes of information from Colonial...
The most significant single obstacle to progress in cybersecurity is not the technical challenge or even the workforce/skills gap. In 2011, the Department of Homeland Security...
The Treasury Department runs a program to insure the insurers, but there’s a limit to the backstop. The Government Accountability Office plans to review how well-suited...
Recent Comments