Dismantling the barriers to women entering and thriving in the historically male-dominated cybersecurity field requires a multi-faceted approach, attendees at an infosec roundtable have heard. There...
The threat of Russian retaliation against the west is front-of-mind with Senate passage of key bills to require reports of ransomware payments and other cybersecurity incidents...
The conflict in Ukraine is reinforcing an industry-friendly argument for how the government should regulate cybersecurity. As Russia uses technology to advance its invasion of Ukraine,...
The two-year campaign targeted sensitive but unclassified information stored by defense industrial base companies. Russian hackers are getting a look at U.S. military weapons development and...
To improve the joint strike fighters’ defenses against cyber attacks, the program office responsible for it wants an open system design solution. The Defense Department is...
A rule the commission proposed for investment funds and advisors is not precisely what key cybersecurity leaders had in mind. A bipartisan letter from a handful...
The DHS body’s primary focus will be on addressing vulnerabilities in the commonly used log4j software library, but will also incorporate findings on the ‘SolarWinds’ hack....
No effort is more important in cybersecurity than creating a highly skilled workforce to protect both public and private systems. As the world becomes increasingly digital,...
Cybersecurity professionals say the board needs subpoena authority in order to be effective. Rob Silvers, the Department of Homeland Security’s under secretary for strategy, policy and...
The log management tool Microsoft is marketing as a way for agencies to fulfill administration requirements for network visibility could contribute to a risky ‘monoculture,’ according...
Recent Comments