Cybersecurity flag

IT security technology provider Webroot said in a recently issued threat report document that the United States in 2018 led the rest of the world by a wide margin in hosting what the firm classifies as “high-risk URLs.” […]

Credit rating agency Moody’s said in a report issued today that it considers banks, securities firms, financial market infrastructure, and hospitals at “high risk,” from a ratings perspective, due to their exposure to the impacts of cyberattacks. […]

Cybersecurity flag

The White House’s new National Strategy for Aviation Security calls attention to a rising concern in aviation safety: the potential for cyberattacks on aircraft, a prospect that might just be as scary as it sounds. […]

Pentagon Military Defense DoD

Senior Defense Department officials told House members on Tuesday they are taking additional steps to boost cybersecurity workforce ranks at the Pentagon through means including the Cyber Excepted Service (CES) personnel system authorized in 2016 that allows DoD to expedite and simplify recruiting and hiring for civilian cyber professionals. […]

elections, voting, election security, midterms

While much of the country was focused today on the testimony of Michael Cohen–President Trump’s former lawyer–before the House Committee on Oversight and Reform, elsewhere on the Hill the House Committee on Appropriations Financial Services and General Government Subcommittee was hearing testimony on election security. […]

Phone mobile security protection

With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology. […]

Most private and public sector CIOs have, are, or will be increasing their spending on cybersecurity and automation software deployments, according to a survey released today by Grant Thornton and the TBM Council. […]

Palo Alto Networks’ Unit 42 researchers announced on Friday that they have identified a spear phishing campaign from November 2018 that is targeting U.S. national security think tanks and academic institutions. Research indicates that the “threat actor might have interests in gathering intelligence related to not only North Korea, but possibly wider in the Northeast Asia region.” […]

The Cybersecurity and Infrastructure Security Agency (CISA) is seeking feedback on proposed updates to the National Emergency Communications Plan (NECP) after being informed from 2018 baseline assessment results. […]

chip hack cybersecurity cyber
White House

The White House on Wednesday issued its new National Strategy for Aviation Security (NSAS) which calls for greater efforts to protect the U.S. “Aviation Ecosystem” from a range of threats including those posed by cyberattacks and unmanned aerial systems (UAS). […]

Pentagon Military Defense DoD

The Department of Defense’s Artificial Intelligence Strategy puts the DoD on more of a fast track toward developing and employing AI and machine learning to support, as the strategy’s preface states, “a force fit for our time.” The strategy outlines an accelerated, collaborative approach with industry, academia, and allies toward new technologies that will “transform […]

Cybersecurity cyber

Cybersecurity technologies provider Symantec reported that ransomware activity fell by 20 percent in 2018 on a year-over-year basis, but that the focus of attacks shifted sharply toward enterprises and away from consumers last year. […]

Independent Security Evaluators (ISE) found security flaws in several popular password managers. In a report released yesterday, ISE found flaws that expose user credentials in computer memory while locked. […]

ransomware
Cyber Security Brainstorm

The Intelligence Advanced Research Projects Activity (IARPA) announced it will host a Proposers’ Day on Feb. 26 for its Secure, Assured, Intelligent Learning Systems (SAILS) program, and its Trojans in Artificial Intelligence (TrojAI) program. […]

Cybersecurity flag
cybersecurity
Cybersecurity cyber

Discussions this morning with a Federal agency IT professional and an IT acquisition professional revealed very different views of the Federal government’s security posture.

Shared on the condition of no attribution during an AFCEA (Armed Forces Communications and Electronics Association) Bethesda event Tuesday morning, the speakers’ varying opinions showed how the balance between security and effectiveness is an issue still up for debate. […]

Panelists at a Brookings Institution event last week agreed that it’s more important to implement artificial intelligence (AI) and other “smart cities” technologies in a secure and responsible manner, rather than merely to win the race to be the first tech adopters on the block. […]

smart cities

The EastWest Institute (EWI) on Thursday released a new report providing guidance on how to make tomorrow’s “smart cities” secure and safe through effective technology management by executives and administrators. […]

With the 2020 national election cycle on the horizon, House Homeland Security Committee Chairman Bennie Thompson, D-Miss., convened a hearing Wednesday to examine the how the United States was working to secure its elections. The hearing, broken into two panels, heard from senior Federal election officials, as well as state and local election officials. […]

voting, election, election security

With the 2020 national election cycle on the horizon, House Homeland Security Committee Chairman Bennie Thompson, D-Miss., convened a hearing Wednesday to examine the how the United States was working to secure its elections, and despite some partisan squabbling from members over the issue, a senior Homeland Security Department (DHS) official testified that election security is on the upswing. […]

IoT Connected Devices Internet of Things

The proliferation of the Internet of Things (IoT) is soon to be accelerated with the arrival of 5G, which promises a world of smart devices that can improve everything from public transportation and driverless cars to remote medical care. […]

Categories