Fifteen million people might stay at home on Election Day because they feel insecure about the safety of their voting information, according to a survey conducted by the cybersecurity firm Carbon Black. […]

The White House has launched the Lock Down Your Login awareness campaign to focus on strong authentication technologies that are available online as part of the Cybersecurity National Action Plan. […]

A group of U.S. senators wrote a letter to Marissa Mayer, chief executive officer of Yahoo, on Tuesday about the hack on 500 million accounts in 2014. They ask what went wrong and how Yahoo plans to protect consumer data in the future. […]

The Food and Drug Administration lacks sufficient security controls, jeopardizing the confidentiality and availability of its data and systems, according to a recent GAO report. […]

Though Donald Trump and Hillary Clinton in Monday night’s presidential debate agreed that cybersecurity and cyber warfare would be one of the next president’s biggest challenges, they clashed on whom to blame for the Democratic National Convention hack and the current state of cyber in the United States. […]

The investigation into the August hack of the National Security Agency’s cybersecurity tools is looking into a theory that a former NSA employee left the information on a remote server that the Russian hackers found, according to Reuters. […]

Members of the House Committee on Science, Space, and Technology disagreed on Wednesday on whether the Cybersecurity Responsibility and Accountability Act of 2016 acted as a partisan dig against former Secretary of State and current Democratic presidential nominee Hillary Clinton and her use of a private email server. […]

In order to help organizations evaluate the effectiveness of their cybersecurity risk management efforts, the National Institute of Standards and Technology recently released the draft “Baldrige Cybersecurity Excellence Builder,” which acts as an assessment tool to pair with the NIST Cybersecurity Framework. […]

Thousands of students from hundreds of universities have approximately 103 days, 10 hours, and 27 minutes to help the National Security Agency disarm a remote-controlled improvised explosive device for this year’s Codebreaker Challenge. […]

The Technical Guidelines Development Committee’s cybersecurity working group doesn’t know what to focus on in terms of voting security less than two months from Election Day. “It’s not clear where to go or whether our group should do anything on this,” said member David Wagner, computer science professor at the University of California-Berkeley. […]

Many Federal agencies struggle with whittling down their cybersecurity priorities. Meeting with individual organizations within an agency to gauge their priorities is a solution that can be transferred from the private sector to the Federal world, according to Rocky DeStefano, cybersecurity subject matter expert at Cloudera. […]

Strategic plans and scorecards are essential to effectively budgeting their cybersecurity needs, agency officials said. Michael Johnson, CIO of the Department of Energy, said the agency uses the DOE Cyber Strategy for information sharing and safeguarding, using multifactor authentication, and focusing on research and development. […]

The Defense Information Systems Agency receives notifications for about 800 million alarms a day while providing support for 146 mission partners, and Maj. Gen. Sarah Zabel, vice director, said the agency is trying to grant all 146 partners access to the commercial cloud. […]

The NIST Commission on Enhancing National Cybersecurity should prioritize the NIST Cybersecurity Framework, the Cybersecurity Information Sharing Act of 2015, and creating norms and deterrence strategies, according to officials at the U.S. Chamber of Commerce. […]

cybersecurity

Comments close Friday at 5 p.m. on the NIST Commission on Enhancing National Cybersecurity’s request for information on how best to address the “current and future states of cybersecurity in a digital economy.” […]

Due to the breadth and depth of cyberattacks and breaches in the Federal government, most especially the Office of Personnel Management, agencies should be implementing a policy of zero trust when it comes to who is accessing their data, according to Rep. Jason Chaffetz, R-Utah. His committee released a report titled “The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation.” […]

Categories