A significant percentage of surveyed working adults do not grasp or implement basic cybersecurity concepts and practices, according to Proofpoint’s recently released 2018 User Risk Report. […]
While “large impactful [cyber] incidents” are on the rise, there are fewer “high-profile public disclosures,” according to a FireEye’s year’s M-Trends 2019 Report, which is based on FireEye Mandiant’s investigations of the most interesting and impactful cyberattacks of 2018. […]
The Department of Energy (DoE) upgraded its Cybersecurity Capability Maturity Model (C2M2) to help measure how organizations effectively protect themselves from cyber threats. […]
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the National Cyber Security Alliance (NCSA), announced on Aug. 14 the release of the 2019 National Cybersecurity Awareness Month (NCSAM) Toolkit. […]
A cyber threat landscape report released today found that the shifting cyber landscape has led threat actors to adjust operations strategically, operationally, and technically. […]
Despite a downtick in number of states using paperless voting equipment since 2016, eight states are still expected to use paperless machines in the 2020 election, according to an Aug. 13 Brennan Center for Justice report. […]
TechNet President and CEO Linda Moore wrote the House and Senate Armed Services Committees on Aug. 12 to raise concerns with the current draft of the FY2020 National Defense Authorization Act (NDAA). […]
A Federal hiring freeze ordered in a January 2017 presidential memo resulted in “significant” staffing reductions across the State Department – including the inability to fill two Senior Executive Service cybersecurity positions, which then delayed implementing an enterprise risk management program for IT systems. […]
FireEye announced that it was able to identify a new Chinese hacker group, which they have labeled as Advanced Persistent Threat group 41 – or APT41. […]
The Army Futures Command (AFC) is currently developing new wearable identity authentication and authorization technologies, according to an Aug. 7 press release. […]
While the Continuous Diagnostics and Mitigation (CDM) program is here to stay for Federal agencies, taking proper approaches to data classification, collection, and analysis are key components to optimizing the program’s aims, security experts said last week at MeriTalk’s Cyber Security Brainstorm event. […]
In a letter on Aug. 7, Sen. Ron Wyden, D-Ore., wrote to telecom giants AT&T, T-Mobile, Sprint, and Verizon and urged them to store less sensitive customer data. […]
The Department of Homeland Security (DHS) is putting together a single contract vehicle that will award multiple vendors to manage DHS’ 17 unclassified security operations centers (SOCs). […]
FBI Cyber Readiness, Outreach, and Intelligence Branch Deputy Assistant Director Tonya Ugoretz stressed at today’s MeriTalk Cyber Security Brainstorm that robust and resilient Federal cybersecurity requires collaboration across agencies and non-government partners. […]
The Federal Acquisition Regulation will ban agencies from procuring equipment from five Chinese companies, including Huawei and ZTE, starting August 13, according to an interim rule published August 7. […]
The Congressional Budget Office (CBO) released its estimate for S. 406, the Federal Rotational Cyber Workforce Program Act of 2019, and found that it would cost less than $500,000 annually to implement. […]
After only two years since the U.S. Air Force’s (USAF) launched Kessel Run, its Branch Chief Erynn Petersen touted the success they have seen in providing USAF with agile and resilient cybersecurity responsiveness at MeriTalk’s Cyber Security Brainstorm today. Petersen also stressed how Kessel Run can pose as a model for other cybersecurity teams. […]
Sens. Marco Rubio, R-Fla., Tom Cotton, R-Texas, and Josh Hawley, R-Mo., wrote to Google CEO Sundar Pichai on Aug. 7 questioning the tech giant’s ties to China. […]
The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Aug. 6 urging the public to “watch out for possible malicious cyber activity seeking to capitalize on” the recent mass shootings in El Paso, Texas, and Dayton, Ohio. […]
Federal agency approaches to identity management don’t have a single approach across the government, but vary to significant degrees with agencies’ mission focus, said LaChelle LeVan, Acting Director for Federal Identity, Credential and Access Management (ICAM) Program Office at the General Services Administration (GSA). […]
The Department of Justice (DoJ) announced Aug. 6 that it has extradited Muhammad Fahd, who allegedly bribed AT&T workers to plant malware and illegally unlock cell phones. […]
Officials from the Defense Department (DoD) highlighted supply chain and workforce and culture issues as two significant problems the agency faces in maintaining strong cybersecurity, during a panel discussion at FCW’s Cybersecurity Summit. […]
FBI Director Chris Wray announced Aug. 5 that Robert Bone will be special agent in charge of the Counterintelligence and Cyber Division of the Los Angeles Field Office. […]
Senior Security Architect for the General Services Administration’s (GSA’s) Technology Transformation Services (TTS) and Centers of Excellence (CoE) Dan Jacobs wants agencies and industry alike to heed the lessons GSA has learned from experience and the Black Hat conference over the past 16 years when it comes to securely implementing cloud. […]
The Federal government is looking forward to implementing 5G wireless services as they become available, but building security into 5G services from the beginning will be key to a successful implementation, said officials from the Department of Defense (DoD), the Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA). […]
Distributed denial of service (DDOS) attacks rose by 39 percent between the first half of 2018 and June of this year, Netscout Systems said in a new threat intelligence report. […]
An August 5 alert issued by Microsoft’s Security Response Center is blowing the whistle on hacking efforts focused on three classes of internet of things (IoT) devices that Microsoft asserts are being attacked by the hacking group it identifies as “Strontium,” better known as the Russia-based cyber espionage group Fancy Bear. […]
The National Institute of Standards and Technology (NIST) wrote to Sen. Ron Wyden, D-Ore., on July 22 sharing details about its forthcoming guidance on how to securely share .zip files. […]
The U.S. Army is seeking industry partners to assist with securing cyberspace operating areas to free up soldiers to “defend forward.” […]
A lack of budgeted funds for cloud initiatives is slowing down Federal government cloud adoption, according to a report from Netwrix released today. […]