The Federal Trade Commission (FTC) found that the six largest internet service providers (ISPs) in the U.S. collect and share customers’ personal data without providing them...
The Federal Mobility Group’s new guidance includes four strategic pillars that form the foundations of mobile security. Even before the pandemic, the government was working hard...
There’s much to be considered as ‘what could be one of the most disruptive periods in human history’ approaches. In producing and carrying out an increasingly...
Companion legislation awaits a vote in the Senate. The House Wednesday passed legislation geared toward preventing equipment and technology from certain Chinese Community Party-backed firms from...
Hackers who learned skills in government service are branching out “for their own personal enrichment,” Pentagon cyber leader says. Russian actors are behind many of the ransomware...
Health systems can prevent outsiders from tampering with the equipment that keeps vaccines ultra cold. Health systems can prevent the hacking of electronics in the “cold...
Deputy Attorney General Lisa Monaco also promised to compensate whistleblowers who reveal federal contractors misrepresenting their cybersecurity posture. Companies could shield themselves from legal challenges in...
A new interim rule takes aim at Russia and China. U.S. companies will need to obtain a license from the Commerce Department to sell certain kinds...
Every organization doing business with the government will have to name a real person as account administrator and go through a three-point ID proofing process. The...
Patching is a fact of life for IT administrators. And, although it is essential to maintain security, keeping up with vendors’ patch release cycles is a...
Recent Comments