Cyber Security
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization...
Taking a proactive approach is a critical step in improving the way the government combats threats. One in three cyber incidents strike the public...
The new Federal Information Security Modernization Act guidance also prioritizes security testing and doubles down on CISA’s Continuous Diagnostics and Mitigation program. The Office...
Attackers could have modified the nameservers of any domain under Tonga’s country code top-level domain (ccTLD) due to a vulnerability in the TLD registrar’s...
Different cloud environments have different security needs. Here’s how to create a cloud-security scaffolding to strengthen protections while reducing manual support. On-prem data centers,...
Critical vulnerabilities in open source forum platform NodeBB could allow attackers to steal private information and access admin accounts, researchers have warned. NodeBB is...
A new phishing campaign has been targeting verified Twitter accounts, as seen by BleepingComputer. Verified accounts on Twitter refer to those possessing a blue...
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers,...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed...
The new definition allows industry more flexibility to decide what should trigger reporting mandates for the sector. The Transportation Security Administration has changed the...
Recent Comments