Cyber Security
The agencies also warned of impending commoditization by criminal groups of access gained through vulnerabilities in the email and calendar service. Federal agencies responding...
Hi, what are you looking for?
The agencies also warned of impending commoditization by criminal groups of access gained through vulnerabilities in the email and calendar service. Federal agencies responding...
The Homeland and Cyber Threat Act would amend the Foreign Sovereign Immunities Act to give Americans legal recourse for damages caused by foreign hackers....
The official domain for .gov websites shifted from the government’s landlord to the government’s central cybersecurity shop. Management of the internet domain reserved for...
The audit found the Defense Department has improved weapon systems cybersecurity in recent years, but detailed requirements must make it into contracts. Despite the...
Rep. Adam Smith, D-Wash., suggested a 500-ship Navy is inadequate if adversaries are able to disrupt command and control systems. House Armed Services Committee...
The federal government should consider hardware-enabled security approaches. Because cyber criminals have proven over time that they are capable of circumventing the wealth of...
Require companies to disclose breaches to the government in exchange for legal liability limitations. The most intriguing suggestion at the first Senate Intelligence Committee...
In a contentious nomination hearing, Colin Kahl called for a whole-of-government approach to technology. In between heated questions from Republican senators about tweets and...
Agencies showed some slight progress on IT issues, though cybersecurity took a step backward in the latest report. The Government Accountability Office released its biennial...
Like many other sectors, the space industry needs to secure its supply chain from start to finish. Since President John F. Kennedy announced plans...
Recent Comments