Capital, House of Representatives, Congress, Senate

The Government Accountability Office (GAO) recommended that the Transportation Security Administration (TSA) revise its pipeline security, cybersecurity guidelines, and risk assessment methodology, and build a more robust cybersecurity workforce to enhance its pipeline security program.






[…]

Christopher Krebs under secretary undersecretary DHS Department of Homeland Security National Protection and Programs Directorate NPPD leader CISA cybersecurity and infrastructure security agency

On the Hill, Cybersecurity and Infrastructure Security Agency Chris Krebs made the case for his agency’s FY2020 $3.17 billion budget request – which represents a cut over FY2019 funding levels – during an April 30 House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation hearing. In a rare move, there was strong bipartisan support for increasing the funding request and providing more funding to help improve the nation’s cybersecurity posture.






[…]

Cybersecurity cyber

Across multiple cybersecurity programs and efforts, the Federal government is prioritizing protection for its high value assets (HVAs), said speakers at ATARC’s Government Information Technology Executive Council (GITEC) conference on Monday, April 29.






[…]

Professional services company, Accenture, has won a blanket purchase order agreement contract – worth a potential $2 billion – from the Department of Energy (DOE), according to a news release on the company’s website.






[…]

binary, data privacy, breach, data

Efforts to secure data under regulations like the European Union’s General Data Protection Regulation have not improved protections, a Varonis report indicates. Varonis found an uptick in sensitive data availability to personnel this year versus last, after analyzing 54 billion files. The report found that 53 percent of companies have over 1,000 sensitive files open […] […]

EPA Environmental Protection Agency

The Government Accountability Office (GAO) provided an update on the 19 recommendations it made to the Environmental Protection Agency (EPA) made in March 2018 and of those recommendations, the EPA has taken actions to improve on five of the recommendations as of April 2019.






[…]

Distributed denial of service (DDoS) attacks are becoming significantly more frequent and voluminous as attacks have become multi-vectored and transformative over time, according to an April 24 Neustar whitepaper.






[…]

From the still-budding promise of automation technologies to the ever-growing threat of cyber vulnerabilities, partnerships both within the private sector and with the Federal government will shape the contours of large-scale IT advancement in the coming years, explained Yogesh Khanna, CTO at General Dynamics Information Technology, at GDIT’s Emerge event in Washington on Tuesday.






[…]

healthcare cyber-min

To make cybersecurity more effective in Federal healthcare, security professionals need to bring a broad swath of folks to the table to build security into technology from the beginning while still enabling the mission, said a panel of Federal chief information security officers and cybersecurity leaders at ACT-IAC’s Health Security, Privacy, and Practice Forum on April 23.






[…]

employee workforce federal worker-min

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and Science and Technology Directorate (S&T) published a five-year Broad Agency Announcement (BAA) looking to develop new mobile communications security standards.






[…]

SonicWall identified an uptick in cyberattacks with PDF origins this year, according to a report it published last week. The network security company identified over 74,000 new PDF-based attacks last year, “a number that has already surpassed in the first quarter of 2019 with more than 173,000 new variants detected.” In March alone, the company […] […]

Secretary of State Mike Pompeo said that a cyberattack could, “in certain circumstances, constitute an armed attack under Article 5 of the U.S.-Japan Security Treaty,” and that the United States would defend Japan in that circumstance.






[…]

Cyber Security Brainstorm

A new report from ACT-IAC (American Council for Technology-Industry Advisory Council) finds that zero-trust technologies are available and lend themselves to incremental installation, but need support from the mission side of the agency for effective implementation.






[…]

Categories