In a survey released today, Tripwire found that security professionals believe their teams are understaffed and that skilled cybersecurity workers are harder to find. […]
The Cybersecurity Tech Accord announced yesterday that it has added 11 new companies to its pledge, bringing its total to 90 signatories. AnchorFree, Domain Tools, Flowmon Networks, MarkMonitor, NTT, Paladion, Percipiet.ai, Silent Breach, Tanium, Telecom Italia, and Unisys all signed on and pledged to “defend customers everywhere from malicious attacks by cybercriminal enterprises and nation-states.” […]
As mobile security threats continue to grow, an increasing share of companies are knowingly and willingly sacrificing security for profit and expediency, according to Verizon’s 2019 Mobile Security Index. […]
In a letter dated Feb. 27, Sens. Mark Warner, D-Va., and Marco Rubio, R-Fla., requested Dan Coats, director of National Intelligence, produce “an unclassified report on the participation of China and other adversarial nations in the international standard setting bodies (ISSBs) for fifth-generation wireless telecommunications technologies (5G).” […]
The United States Transportation Command (USTRANSCOM) is working to improve cybersecurity infrastructures to prevent breaches of industry partners, like those of USTRANSCOM contractors that began June 1, 2012 and resulted in 20 successful intrusions over a period of 12 months by Chinese hackers. […]
A survey released today by IT management software firm SolarWinds finds that Federal IT professionals view unintentional insider threat as the most significant source of security threats. […]
Information systems trade group ISACA released results of a survey today that finds 70 percent of cybersecurity managers and practitioners believe that their organizations’ cybersecurity teams are understaffed. […]
The Congressional Budget Office (CBO), in a report released Friday, pegged the cost of H.R. 1–the For the People Act of 2019–at $2.6 billion over the next five years, with $1.5 billion of that going for states and counties to purchase new voting technology. […]
During a meeting with reporters, Federal CIO Suzette Kent highlighted the successes of the Federal Cyber Reskilling Academy so far, and raised the potential of expanding the program in the future. […]
A bipartisan group of senators reintroduced legislation on March 1 intended to ensure that public companies are prioritizing cybersecurity and data privacy. […]
The Federal Cyber Reskilling Academy is on the verge of selecting its first cohort, according to a tweet from Federal CIO Suzette Kent. […]
IT security technology provider Webroot said in a recently issued threat report document that the United States in 2018 led the rest of the world by a wide margin in hosting what the firm classifies as “high-risk URLs.” […]
Credit rating agency Moody’s said in a report issued today that it considers banks, securities firms, financial market infrastructure, and hospitals at “high risk,” from a ratings perspective, due to their exposure to the impacts of cyberattacks. […]
If you’re just regular people, the answer is probably not. […]
The White House’s new National Strategy for Aviation Security calls attention to a rising concern in aviation safety: the potential for cyberattacks on aircraft, a prospect that might just be as scary as it sounds. […]
Senior Defense Department officials told House members on Tuesday they are taking additional steps to boost cybersecurity workforce ranks at the Pentagon through means including the Cyber Excepted Service (CES) personnel system authorized in 2016 that allows DoD to expedite and simplify recruiting and hiring for civilian cyber professionals. […]
While much of the country was focused today on the testimony of Michael Cohen–President Trump’s former lawyer–before the House Committee on Oversight and Reform, elsewhere on the Hill the House Committee on Appropriations Financial Services and General Government Subcommittee was hearing testimony on election security. […]
With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology. […]
Most private and public sector CIOs have, are, or will be increasing their spending on cybersecurity and automation software deployments, according to a survey released today by Grant Thornton and the TBM Council. […]
Palo Alto Networks’ Unit 42 researchers announced on Friday that they have identified a spear phishing campaign from November 2018 that is targeting U.S. national security think tanks and academic institutions. Research indicates that the “threat actor might have interests in gathering intelligence related to not only North Korea, but possibly wider in the Northeast Asia region.” […]
The Cybersecurity and Infrastructure Security Agency (CISA) is seeking feedback on proposed updates to the National Emergency Communications Plan (NECP) after being informed from 2018 baseline assessment results. […]
Katie Nickels, a threat intelligence expert for MITRE, released a grassroots compiled list of recent cybersecurity indictments of state-sponsored hackers earlier this week. […]
Yesterday, Sen. Mark Warner, D-Va., sent letters to various healthcare groups to seek information on ways to best improve cybersecurity within the healthcare industry. […]
In the 115th Congress, a new study found that 226 cybersecurity-focused bills were introduced which was an increase compared to past sessions, but only 10 had been signed into law. […]
The White House on Wednesday issued its new National Strategy for Aviation Security (NSAS) which calls for greater efforts to protect the U.S. “Aviation Ecosystem” from a range of threats including those posed by cyberattacks and unmanned aerial systems (UAS). […]
The Department of Defense’s Artificial Intelligence Strategy puts the DoD on more of a fast track toward developing and employing AI and machine learning to support, as the strategy’s preface states, “a force fit for our time.” The strategy outlines an accelerated, collaborative approach with industry, academia, and allies toward new technologies that will “transform […]
Cybersecurity technologies provider Symantec reported that ransomware activity fell by 20 percent in 2018 on a year-over-year basis, but that the focus of attacks shifted sharply toward enterprises and away from consumers last year. […]
Independent Security Evaluators (ISE) found security flaws in several popular password managers. In a report released yesterday, ISE found flaws that expose user credentials in computer memory while locked. […]
Cybercriminals armed with ransomware technologies continued to ramp up their attacks in 2018, most notably those targeting large organizations, according to a report released today by cybersecurity technology provider Crowdstrike. […]
The Intelligence Advanced Research Projects Activity (IARPA) announced it will host a Proposers’ Day on Feb. 26 for its Secure, Assured, Intelligent Learning Systems (SAILS) program, and its Trojans in Artificial Intelligence (TrojAI) program. […]