Cyber Security
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization...
Hi, what are you looking for?
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization...
Taking a proactive approach is a critical step in improving the way the government combats threats. One in three cyber incidents strike the public...
Different cloud environments have different security needs. Here’s how to create a cloud-security scaffolding to strengthen protections while reducing manual support. On-prem data centers,...
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers,...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed...
The new definition allows industry more flexibility to decide what should trigger reporting mandates for the sector. The Transportation Security Administration has changed the...
Federal cybersecurity officials would prefer you keep your holidays a little more secure. Over the Thanksgiving holiday, my good friend Michael Bechetti texted me...
The agency is ramping up efforts to exercise its new authorities to hunt for threats across the .gov enterprise. The Cybersecurity and Infrastructure Security...
The Government Accountability Office says CISA should also update its approach to communications sector reliability by securing the supply chain for information and communications...
A new report by Constella Intelligence raises questions as to whether the sector is doing enough to protect itself. The rash of high-visibility ransomware...
Recent Comments