The Office of the Director of National Intelligence (ODNI) announced Aug. 21 the appointment of Benjamin Huebner as chief of the Office of Civil Liberties, Privacy, and Transparency. […]
Sen. Angus King, I-Maine, and Rep. Mike Gallagher, R-Wis., co-chairs the Cyberspace Solarium Commission, are seeking cyber professional expertise and input to help the commission tackle significant cybersecurity challenges that the United States and its allies face. […]
The Treasury Inspector General for Tax Administration (TIGTA) found that while IT risk management practices are improving for the Internal Revenue Service (IRS), mitigation documentation and oversight practices need to be improved. […]
The U.S. Chamber of Commerce and credit scoring company FICO released its Q2 Assessment of Business Cyber Risk (ABC) report on Aug. 19. […]
Rep. John Ratcliffe, R-Texas, confirmed to MeriTalk that he will reintroduce the Advancing Cybersecurity Continuing Diagnostics and Mitigation (CDM) Act. His office said to expect the bill “within the next month or so.” […]
The Commonwealth of Texas has earned the dubious honor of being the latest state or local government hit by a successful ransomware attack. The Texas Department of Information Resources (DIR) confirmed on Aug. 16 that at least 23 local government entities were hit by a “coordinated” ransomware attack. DIR said it will lead the cybersecurity response to the attack. […]
Researchers from Georgia Institute of Technology and Ohio State University, with National Science Foundation (NSF) funding, developed an automated system to vet cloud servers and software library systems to bolster mobile app security. […]
The Federal government saw a 12 percent reduction in cybersecurity incidents in fiscal year 2018, and no “major” cybersecurity incidents for the year, according to the Office of Management and Budget’s annual report on the Federal Information Security Modernization Act (FISMA). […]
A significant percentage of surveyed working adults do not grasp or implement basic cybersecurity concepts and practices, according to Proofpoint’s recently released 2018 User Risk Report. […]
While “large impactful [cyber] incidents” are on the rise, there are fewer “high-profile public disclosures,” according to a FireEye’s year’s M-Trends 2019 Report, which is based on FireEye Mandiant’s investigations of the most interesting and impactful cyberattacks of 2018. […]
The Department of Energy (DoE) upgraded its Cybersecurity Capability Maturity Model (C2M2) to help measure how organizations effectively protect themselves from cyber threats. […]
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the National Cyber Security Alliance (NCSA), announced on Aug. 14 the release of the 2019 National Cybersecurity Awareness Month (NCSAM) Toolkit. […]
A cyber threat landscape report released today found that the shifting cyber landscape has led threat actors to adjust operations strategically, operationally, and technically. […]
Despite a downtick in number of states using paperless voting equipment since 2016, eight states are still expected to use paperless machines in the 2020 election, according to an Aug. 13 Brennan Center for Justice report. […]
TechNet President and CEO Linda Moore wrote the House and Senate Armed Services Committees on Aug. 12 to raise concerns with the current draft of the FY2020 National Defense Authorization Act (NDAA). […]
A Federal hiring freeze ordered in a January 2017 presidential memo resulted in “significant” staffing reductions across the State Department – including the inability to fill two Senior Executive Service cybersecurity positions, which then delayed implementing an enterprise risk management program for IT systems. […]
FireEye announced that it was able to identify a new Chinese hacker group, which they have labeled as Advanced Persistent Threat group 41 – or APT41. […]
The Army Futures Command (AFC) is currently developing new wearable identity authentication and authorization technologies, according to an Aug. 7 press release. […]
While the Continuous Diagnostics and Mitigation (CDM) program is here to stay for Federal agencies, taking proper approaches to data classification, collection, and analysis are key components to optimizing the program’s aims, security experts said last week at MeriTalk’s Cyber Security Brainstorm event. […]
In a letter on Aug. 7, Sen. Ron Wyden, D-Ore., wrote to telecom giants AT&T, T-Mobile, Sprint, and Verizon and urged them to store less sensitive customer data. […]
The Department of Homeland Security (DHS) is putting together a single contract vehicle that will award multiple vendors to manage DHS’ 17 unclassified security operations centers (SOCs). […]
FBI Cyber Readiness, Outreach, and Intelligence Branch Deputy Assistant Director Tonya Ugoretz stressed at today’s MeriTalk Cyber Security Brainstorm that robust and resilient Federal cybersecurity requires collaboration across agencies and non-government partners. […]
The Federal Acquisition Regulation will ban agencies from procuring equipment from five Chinese companies, including Huawei and ZTE, starting August 13, according to an interim rule published August 7. […]
The Congressional Budget Office (CBO) released its estimate for S. 406, the Federal Rotational Cyber Workforce Program Act of 2019, and found that it would cost less than $500,000 annually to implement. […]
After only two years since the U.S. Air Force’s (USAF) launched Kessel Run, its Branch Chief Erynn Petersen touted the success they have seen in providing USAF with agile and resilient cybersecurity responsiveness at MeriTalk’s Cyber Security Brainstorm today. Petersen also stressed how Kessel Run can pose as a model for other cybersecurity teams. […]
Sens. Marco Rubio, R-Fla., Tom Cotton, R-Texas, and Josh Hawley, R-Mo., wrote to Google CEO Sundar Pichai on Aug. 7 questioning the tech giant’s ties to China. […]
The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Aug. 6 urging the public to “watch out for possible malicious cyber activity seeking to capitalize on” the recent mass shootings in El Paso, Texas, and Dayton, Ohio. […]
Federal agency approaches to identity management don’t have a single approach across the government, but vary to significant degrees with agencies’ mission focus, said LaChelle LeVan, Acting Director for Federal Identity, Credential and Access Management (ICAM) Program Office at the General Services Administration (GSA). […]
The Department of Justice (DoJ) announced Aug. 6 that it has extradited Muhammad Fahd, who allegedly bribed AT&T workers to plant malware and illegally unlock cell phones. […]
Officials from the Defense Department (DoD) highlighted supply chain and workforce and culture issues as two significant problems the agency faces in maintaining strong cybersecurity, during a panel discussion at FCW’s Cybersecurity Summit. […]