President Obama, shown in Charlotte, N.C., on July 5, said in the report, "The commission’s recommendations affirm the course that this administration has laid out, but make clear that there is much more to do and the next administration, Congress, the private sector, and the general public need to build on this progress." 
(Photo: Evan El-Amin, Shutterstock)
(Image: Shutterstock)

An effort to block or delay changes to Rule 41 of the Federal Rules of Criminal Procedure failed to pass the Senate floor, causing the changes to the rule to go into effect on Dec. 1. The changes will allow law enforcement to obtain warrants to search computers in an unknown location and to search any device that the hacker has broken into, potentially granting access to multiple privately owned computers with one warrant.






[…]

(Image: Shutterstock)
(Image: Shutterstock)
(Photo: Shutterstock)

President-elect Donald Trump during his transition is relying on two American Enterprise Institute contributors for advice on technology policy, which consists of calls for deregulation of the National Security Agency and an end to net neutrality.






[…]

(Image: Shutterstock)

The National Initiative for Cybersecurity Education program divided $1 million in grant funding evenly among five academic institutions to support cybersecurity education among students.






[…]

Rep. Gerry Connolly makes a point at MeriTalk's Cloud Computing Brainstorm in June. (Photo: MeriTalk)

Rep. Gerry Connolly, D-Va., spearheaded a letter signed by 15 members of the House Foreign Affairs Committee to request that the committee hold a hearing on the attempts by foreign powers to influence the U.S. presidential election.






[…]

(Photo: Shutterstock)
(Image: Shutterstock)

In determining whether agency CIOs have learned their lesson after the 2015 OPM data breach, Rep. Will Hurd, R-Texas, commended NASA CIO Renee Wynn on her “unprecedented” move to refuse an end-user service provider the authority to operate due to a lack of knowledge about the potential risks of that service.






[…]

(Image: Shutterstock)
1 2 3 27