Cyber Security
The marketplace was built as part of a recent Defense Department initiative aimed at advancing microelectronics technologies. IBM announced the establishment of a new...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The marketplace was built as part of a recent Defense Department initiative aimed at advancing microelectronics technologies. IBM announced the establishment of a new...
The legislation would require companies to write their privacy policies in plain English. The House will soon consider legislation that would create the federal...
Like with any new agency initiative, nothing moves forward without executive sponsorship. Without question, 2020 was a very difficult year for all of us....
The agencies also warned of impending commoditization by criminal groups of access gained through vulnerabilities in the email and calendar service. Federal agencies responding...
Reps. Elissa Slotkin, D-Mich., and Mike Gallagher, R-Wisc., are leading the three-month task force. A new task force will look for legislative tools that...
The Homeland and Cyber Threat Act would amend the Foreign Sovereign Immunities Act to give Americans legal recourse for damages caused by foreign hackers....
The official domain for .gov websites shifted from the government’s landlord to the government’s central cybersecurity shop. Management of the internet domain reserved for...
The audit found the Defense Department has improved weapon systems cybersecurity in recent years, but detailed requirements must make it into contracts. Despite the...
Rep. Adam Smith, D-Wash., suggested a 500-ship Navy is inadequate if adversaries are able to disrupt command and control systems. House Armed Services Committee...
The federal government should consider hardware-enabled security approaches. Because cyber criminals have proven over time that they are capable of circumventing the wealth of...
Recent Comments