Cyber Security
Processes spurring from the Ragnar Locker Ransomware have affected at least 52 critical infrastructure victims since January, but will terminate if it encounters systems...
Hi, what are you looking for?
Processes spurring from the Ragnar Locker Ransomware have affected at least 52 critical infrastructure victims since January, but will terminate if it encounters systems...
The new package bill was introduced amid calls for increased government support of open-source software development. Leaders of the Homeland Security and Governmental Affairs...
The DHS body’s primary focus will be on addressing vulnerabilities in the commonly used log4j software library, but will also incorporate findings on the...
Cybersecurity professionals say the board needs subpoena authority in order to be effective. Rob Silvers, the Department of Homeland Security’s under secretary for strategy,...
The network guidance document is years in the making. The Cybersecurity and Infrastructure Security Agency on Thursday published guidance meant to provide federal agencies with security...
However the legislation is eventually passed, CISA plans to share reports with the FBI and other agencies, a Homeland Security official said. The need...
Officials say agencies have demonstrated more dedication than ever in addressing a bug with astronomical reach, but organizations are at the mercy of product...
The government’s site for managing government websites—dotgov.gov— may temporarily go down for maintenance as officials make the switch. The General Services Administration is preparing...
Officials must weigh the benefits and risks on a case-by-case basis. For decades, cyberattacks, counterterrorism events and acts of espionage happened in secret—and stayed there....
The agencies got specific about who is responsible for what in a four-part series on securing the inherently cloud-based environments. Federal cybersecurity agencies addressed...