Rep. Adam Smith, D-Wash., suggested a 500-ship Navy is inadequate if adversaries are able to disrupt command and control systems. House Armed Services Committee Chair Adam...
The federal government should consider hardware-enabled security approaches. Because cyber criminals have proven over time that they are capable of circumventing the wealth of software-based security...
An upcoming executive order in response to the hacking campaign that involved SolarWinds will include standards to improve software transparency. The top White House cybersecurity official...
Require companies to disclose breaches to the government in exchange for legal liability limitations. The most intriguing suggestion at the first Senate Intelligence Committee hearing on...
Comments on draft documents required under the IoT Cybersecurity Improvement Act raise concerns of both fragmentation and a lack of flexibility. Time is up for the...
In a contentious nomination hearing, Colin Kahl called for a whole-of-government approach to technology. In between heated questions from Republican senators about tweets and arguments over...
“Identity is everything now,” a technical strategist told NIST advisers in a briefing on the hacking campaign. The way the adversary behind the SolarWinds hack used legitimate credentials...
All agencies must report their status to CISA by noon on March 5. Federal agencies must track and capture data related to all on-premises Microsoft Exchange...
The Homeland Security Department warns it never solicits money over the phone. Fraudsters impersonating U.S. Border Patrol agents and other federal officials are trying to steal...
Agencies showed some slight progress on IT issues, though cybersecurity took a step backward in the latest report. The Government Accountability Office released its biennial list of...
Recent Comments