Congressional leaders of the Cyberspace Solarium Commission stressed a need to focus specifically on water treatment systems. Leaders of the Senate Environment and Public Works Committee...
The agency is looking for support services to help manage the .gov registry as it takes control of the top-level domain from GSA. The government’s central...
Antavo, a loyalty management software company, has launched a bug bounty program on European crowdsourced security platform Hacktify. Ethical hackers will receive payouts up to €240...
Despite substantial annual spending on federal cybersecurity, breaches are still being reported at a disturbingly high rate. Nearly half of U.S. federal government respondents in the 2021...
The bill leaves it up to an interagency rulemaking process to determine whether entities would be required to report incidents they’re aware of but not directly...
The details of a second set of security regulations will not be released publicly. The public will not be privy to the details of a second...
New cryptocurrency could mean new rules. Leading U.S. financial regulators got a preview of an in-the-works report federal staff is preparing on stablecoins—a new class of...
The Defense Department’s needs are diverse and have become even more disparate amidst the post-SolarWinds landscape. The Pentagon’s abandonment of the Joint Enterprise Defense Infrastructure, or...
The White House said it’s accusing China with “high confidence.” The Biden administration and a group of allies on Monday attributed the Microsoft Exchange server attack...
A security researcher says he’s achieved remote code execution (RCE) on older, still downloadable versions of TIBCO Data Virtualization (TDV) software by chaining vulnerabilities in outdated...
Recent Comments