Cyber Security
The Intelligence Authorization Act, which recently cleared committee in the House, empowers—but does not require—the director of national intelligence to bar such acquisitions. The...
Hi, what are you looking for?
The Intelligence Authorization Act, which recently cleared committee in the House, empowers—but does not require—the director of national intelligence to bar such acquisitions. The...
Legislation seeking to amend the annual National Defense Authorization Act wants the Government Accountability Office to investigate. A new public-private body within the Department...
As the agency finalizes guidance for approving the sale of devices such as those used to monitor and control glucose levels, the comments highlight...
The Microsoft program—PowerShell—has granted malicious actors in major hacks remote command and control ability over victims, but, by the same token, it can improve...
Organizations are asked to report incidents they might ordinarily consider inconsequential to the government. The Cybersecurity and Infrastructure Security Agency and the FBI acknowledged...
The Cyberspace Solarium Commission emerged due to the late John McCain’s frustration with current U.S. doctrine on what should trigger a “use of force.”...
Cyber activity is focused heavily on eastern Europe. Russia’s invasion of Ukraine is not just capturing the world’s attention—it’s drawing a massive amount of...
The Office of Management and Budget pressed federal agencies on a deadline to adopt the software supply chain best practices as directed under last...
Processes spurring from the Ragnar Locker Ransomware have affected at least 52 critical infrastructure victims since January, but will terminate if it encounters systems...
The federal chief information security officer is moving ahead with congressional priorities for the .gov enterprise, as lawmakers fail to pass bipartisan incident reporting...
Recent Comments