The U.S. Department of Homeland Security and the General Services Administration hosted an industry day to address companies’ questions regarding DHS’s Request for Information regarding mobile threats and defenses. […]

The U.S. Department of Health and Human Services Office for Civil Rights recently released new Health Insurance Portability and Accountability Act guidance on ransomware.






[…]

The National Security Agency is working on possibly developing software to respond to digital acts of war, NSA Director Adm. Michael S. Rogers said this week at MeriTalk’s Federal Forum in Washington, D.C. That software could help the United States respond to cyber incidents to turn the situation in its favor.






[…]

In 2008, the Department of Defense Cyber Crime Center invited 16 companies to discuss information sharing and collaboration. Today, the DC3 partners with 400 companies to share information. Maintaining relationships with partner companies was an important subject at the Federal Forum 2016’s panel on Information Sharing and Next-Gen Defense.






[…]

Due to its relatively new and complex nature, there is no straightforward method for categorizing a cyberattack as a digital act of war, according to witnesses at a House Oversight Committee hearing.






[…]

One of the major problems facing the cybersecurity of the nation’s critical infrastructure is a lack of personnel, according to witnesses at both the House Homeland Security Committee and the Senate Energy and Natural Resources Committee. Both committees held hearings on the security of critical infrastructure in the U.S.






[…]

Office of Personnel Management Director Beth Cobert announced the first Federal Cybersecurity Workforce Strategy to address the pervasive problem that government agencies face in recruiting and retaining a sufficient cybersecurity workforce.






[…]

Small businesses are prime targets for today’s hackers, according to witnesses testifying at the House Small Business Committee. “According to a recent report by Verizon Enterprise, over 70 percent of attacks occurred in businesses with fewer than 100 employees,” said Rep. Steve Chabot, R-Ohio.






[…]

Your job may end up being done by a computer in the not-so-distant future, according to participants in a White House-hosted discussion. The discussion addressed how the future of automation can provide many social and economic advantages, but could also be a major disadvantage for those who would lose their jobs to robots.






[…]

The Department of Homeland Security on Monday announced a program called Exemplar, in which DHS employees with backgrounds in science, technology, engineering, and mathematics will work for a six-month period at a for-profit, private sector company. On Tuesday, DHS received its first application from one such company.






[…]

An update to the Federal Rules of Criminal Procedure, specifically Rule 41, which could automatically take effect in December, is once again bringing up concerns of privacy and security in the digital world. “The changes in Rule 41 leave Americans […] more exposed to threats, and, of course, put at risk their liberty,” said Sen. Ron Wyden, D-Ore. “Our lives are lived online; most of our most private information is stored on the cloud.”






[…]

Ransomware is the least of a CIO’s worries, according to new report issued by the Institute for Critical Infrastructure Technology (ICIT). James Scott, ICIT senior fellow and Drew Spaniel, ICIT researcher, co-authors of a new report, titled “The Anatomy of Cyber-Jihad: Cyberspace is the New Great Equalizer,” call cyber jihadists the latest threat to America […] […]

Government IT has a problem with planning better solutions, not coming up with ideas for those solutions, according to Federal CIO Tony Scott. “Ideas are not the problem in Washington; Washington is full of ideas. What Washington doesn’t have…is a good implementation plan for those ideas,” Scott said at a Citrix cybersecurity event.






[…]

The Internet of Things will soon transform the way transportation and infrastructure operate in the United States, according to witnesses at the Senate Subcommittee on Surface Transportation and Merchant Marine Infrastructure, Safety, and Security hearing.






[…]

The 18 government agencies with high-impact systems constantly fend off cyberattacks from “nations,” which are groups of hackers sponsored by nation-states. According to a U.S. Government Accountability Office security report, these attacks pose the most serious threat to the security of these systems.






[…]

An initiative is underway at the Energy Department’s National Renewable Energy Laboratory aiming to prevent hackers from gaining control of parts of the nation’s power grid, or Industrial Control System. As the grid gets smarter, threats increase, including damage to electrical equipment, local power outages, operational halts to production, and more.






[…]

The National Institute of Standards and Technology has updated its Cybersecurity Framework in response to user comments that the original framework was too vague in its Implementation Tiers, the measure by which organizations gauge their approach to managing cybersecurity risk.






[…]

1 83 84 85 86 87 92

Categories