Cyber Security
There are real security concerns that should be addressed ahead of further government adoption of a truly automated future. Much as a character in...
Hi, what are you looking for?
There are real security concerns that should be addressed ahead of further government adoption of a truly automated future. Much as a character in...
Insider risk can’t be overlooked. For almost a year, Navy engineer Jonathan Toebbe and his wife Diana sold information known as restricted data concerning...
Officials must weigh the benefits and risks on a case-by-case basis. For decades, cyberattacks, counterterrorism events and acts of espionage happened in secret—and stayed there....
The agencies got specific about who is responsible for what in a four-part series on securing the inherently cloud-based environments. Federal cybersecurity agencies addressed...
With ransomware hackers varying their targets to include operational technology used by U.S. factories and manufacturers, is an OT executive order needed to help...
Officials stressed the importance of maintaining a bill of materials for software in flagging the “Log4j” vulnerability. The Cybersecurity and Infrastructure Security Agency has...
Officials in the public and private sectors warned of the need to enact a robust cybersecurity posture at the federal level ahead of growing...
Cloud sprawl happens when development teams spin up new cloud resources, forget about them, then move on to the next urgent task. Migrating to...
The watchdog made several recommendations in an audit of the Cybersecurity Maturity Model Certification effort. The Defense Department needs to improve communication with industry...
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization...