The Office of the Inspector General at the Office of Personnel Management audited the agency’s security programs and practices under the Federal Information Security Modernization Act and found a significant deficiency in OPM’s security management structure. […]
The National Initiative for Cybersecurity Education program divided $1 million in grant funding evenly among five academic institutions to support cybersecurity education among students. […]
Rep. Gerry Connolly, D-Va., spearheaded a letter signed by 15 members of the House Foreign Affairs Committee to request that the committee hold a hearing on the attempts by foreign powers to influence the U.S. presidential election. […]
The Department of Defense announced two initiatives based on the past success of Hack the Pentagon and aimed at increasing vulnerability reporting opportunities: a Vulnerability Disclosure Policy and Hack the Army. […]
In determining whether agency CIOs have learned their lesson after the 2015 OPM data breach, Rep. Will Hurd, R-Texas, commended NASA CIO Renee Wynn on her “unprecedented” move to refuse an end-user service provider the authority to operate due to a lack of knowledge about the potential risks of that service. […]
In the “Wild West” of augmented reality applications, the U.S. government has to balance the concerns of helping to protect consumer privacy and security while also leaving room for companies to freely innovate, according to witnesses at a Senate Energy and Commerce hearing. […]
Though many small businesses may think that they are too trivial to be the target of a cyberattack, even the smallest businesses can face cyberattack and can face serious repercussions, according to Pat Toth, supervisory computer scientist in the computer security division at the National Institute of Standards and Technology and author of NIST’s cybersecurity guide “Small Business Information Security: The Fundamentals.” […]
If agencies improve their threat monitoring, correlation, and protection automation, they could save an estimated 27 percent, or $5 billion annually, of their cybersecurity budgets, according to a MeriTalk survey titled Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation. […]
The National Institute of Standards and Technology (NIST) recently released a resource to help U.S. employers more effectively identify, recruit, develop, and maintain cybersecurity talent. The NICE Cybersecurity Workforce Framework (NCWF) provides a common language to categorize and describe cybersecurity work to help organizations build a strong cybersecurity staff. […]
The day before the election, the White House and other Federal agencies are getting ready to mitigate and strike back if necessary, in the event of a state-sponsored cyberattack against the United States. Ann Barron-DiCamillo, former director of the Department of Homeland Security’s computer emergency readiness team, said the denial-of-service attack against Dyn in October “had all the signs of…a drill.” […]
All 50 states have reached out to the Department of Homeland Security for cybersecurity services, a DHS official said on the day before Election Day. […]
In the wake of October’s Distributed Denial of Service attack that used hundreds of unsecured devices to prevent access to a number of U.S. websites, Reps. Frank Pallone, D-N.J., and Jan Schakowsky, D-Ill., wrote a letter to Federal Trade Commission Chairwoman Edith Ramirez asking that her agency take action to ensure greater security of Internet of Things devices. […]
If government agencies don’t cooperate with both each other and the private sector on threat intelligence, they’ll never be able to keep up with the hackers working against them, according to Cloudera’s director of cybersecurity strategy, Sam Heywood. […]
The National Institute of Standards and Technology announced the release of CyberSeek, an interactive map that shows cybersecurity job availability by both state and locality. […]
In order to ensure the security of IT devices while also reducing the proliferation of “shadow IT” in the government, agencies must work to create “win-win” compromises with device users, according to panelists at Dell EMC World. […]
The hacker group the Shadow Brokers released files Monday alleging to show which foreign governments and organizations were under surveillance by the National Security Agency. The Shadow Brokers directly asked the U.S. government to pay for the remaining files to be returned. […]
In the push to modernize legacy IT systems, agencies should be more strategic about which systems they choose to invest in, according to experts at Dell EMC World. […]
The Federal Communications Commission voted to adopt new online consumer privacy rules that would require Internet service providers to obtain opt-in consent for the collection of sensitive information and opt-out consent for any other information. […]
In the wake of recent Dyn attacks that temporarily shut down major websites such as Twitter, Amazon, and PayPal, Sens. Angus King, I-Maine, and Martin Heinrich, D-N.M., sent a letter to President Obama this week to request a strengthening of the U.S. ability to detect and respond to major vulnerabilities. […]
The White House released a proposed guidance on modernizing Federal IT that is open for public comment until Nov. 26. […]
America’s Internet infrastructure could be seeing other denial-of-service attacks similar to the one targeted at Dyn last week, according to Josh Finke at Iron Bow. The large scale of the attack, the availability of the source code for the malware online, and the number of susceptible Internet of Things devices, make this type of attack attractive to hackers. […]
An exception to the Digital Millennium Copyright Act will go into effect this weekend, allowing white hat hackers to legally test the security of consumer-facing products for the purposes of alerting companies to potential bugs in their programs. […]
Cybersecurity professionals can respond and fix vulnerabilities more efficiently by acting like ants, according to Chris Oehmen, senior research scientist at the Pacific Northwest National Laboratory. […]
Over the past few years, many government agencies have turned from doubting and distrusting the cloud to fully embracing its potential, according to Microsoft executives. […]
Agencies deal with a greater volume and velocity of cyber threats today than ever before. To achieve actionable cyber awareness and drive continuity of vital operations, Federal cyber leaders must speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats. […]
Red Hat announced that Red Hat Enterprise Linux 7.1 received the Common Criteria Certification at Evaluation Assurance Level (EAL) 4+. […]
The Department of Transportation issued guidance for motor vehicle cybersecurity to ensure that connected vehicles can make appropriate decisions when cyberattacks are successful. […]
The Department of Homeland Security identified Mirai as one type of malware used in a recent cyberattack that brought down major websites, according to a statement from DHS Secretary Jeh Johnson. […]
The Department of State Foreign Affairs Cybersecurity Center is working with the Bureau of Information Resource Management to create a joint office for cybersecurity. […]
Alongside hampering service to sites like Amazon, Twitter, and PayPal, the massive Distributed Denial of Service attack against the Internet domain name management company Dyn has also drastically affected cancer fundraising efforts by impeding transfers of funds. […]