The Global Cyber Alliance (GCA) on Monday released an interactive tool that consumers, businesses, and governments can use to “measure and quantify” the deployment of the Domain-based Message Authentication, Reporting & Conformance (DMARC) email security protocol. […]

Russia hacking hack cyber-min

Hackers with ties to the Russian government are using a spear-phishing campaign to impersonate Department of State employees, according to cybersecurity firms FireEye and CrowdStrike. […]

Google Cloud

Diane Greene, CEO of Google Cloud, announced Friday that she will be leaving her post in early 2019–a specific date was not mentioned. […]

Cybersecurity cyber

The Department of Homeland Security’s Science and Technology Directorate (S&T) on Friday announced that S&T and the Dutch government are each putting up $1.25 million to fund “collaborative cybersecurity research and development” across five U.S.-Dutch research teams. […]

voting booth, election security
Federal money spending government
Insider threat cybersecurity

Federal agencies need to get into second gear in their efforts to defend against insider threats, as outlined in the “Insider Threat Program Maturity Framework” released this month by the National Insider Threat Task Force (NITTF). Agencies must move past the minimum standards many have established and become more proactive in countering what the task force said is a dynamic threat that has moved beyond basic defenses, according to the framework. […]

data privacy, people, personal data, binary
Federal money spending government

IT officials from the Department of Agriculture (USDA) and the Department of Housing and Urban Development (HUD) detailed progress their agencies have made so far in utilizing grants awarded by the Technology Modernization Fund (TMF), and highlighted the benefits of TMF funding including the ability to repay the working capital fund through cost savings. […]

GSA General Services Administration
Pentagon Military Defense DoD
Cybersecurity flag

Senior officials from the Departments of Defense (DoD) and Homeland Security (DHS) told House members on Wednesday that they are busy working out details of a recently finalized cybersecurity coordination agreement focused on improving Federal government cyber defenses generally, and specifically the cyber defenses of critical infrastructure components on which DoD facilities rely, among other areas. […]

USPS Postal Service

Fraudsters are using the U.S. Postal Services’ (USPS’) Informed Delivery service to perpetrate a multitude of identity theft and credit card fraud schemes, according to an alert the Secret Service sent its law enforcement partners on Nov. 6. […]

military healthcare, veterans healthcare

The House Committee on Veterans Affairs’ Subcommittee on Technology Modernization met today to review the first 180 days of the Department of Veterans Affairs’ (VA) Electronic Health Record Modernization (EHRM) program, with members of Congress anxious to see evidence of progress in the program and VA officials offering some details that point in that direction. […]

quantum computing chip ai -min

Alex Measure, senior economist at the Labor Department’s Bureau of Labor Statistics (BLS)–who has developed and deployed an artificial intelligence application to help the agency analyze workforce health data–said on Tuesday that convincing agency leaders to pursue AI applications can be the toughest part of the development and deployment journey. […]

Machine learning AI modernization

Federal agency officials said on Tuesday that internal work to develop artificial intelligence (AI) technologies is picking up, but also cautioned that the still-experimental nature of those efforts makes it difficult to predict when products and services will emerge from them. […]

DHS Homeland Security

The House late Tuesday approved long-pending legislation that authorizes the Department of Homeland Security to reorganize its existing National Protection and Programs Directorate (NPPD) in order to create a new component agency–the Cybersecurity and Infrastructure Security Agency–within DHS. […]

Washington DC capitol federal government-min

With a new session of Congress–and a power shift in the House–looming in January, big tech companies are looking toward 2019 and possible new privacy legislation that will alter the shape of their business models. […]

Federal Cloud Flag

The General Services Administration’s Technology Transformation Services Division on Nov. 9 issued a request for information (RFI) in connection with a market survey of firms that would provide “professional services” in support of the cloud.gov platform. […]

OPM Office of Personnel Management
Capitol Washington DC Federal
Rob Joyce

The ability of adversaries to attack in cyberspace with low consequence creates the need to impose friction and leads to the tenants of defending forward and continuous engagement with adversaries in cyberspace espoused in the National Cyber Strategy and the Department of Defense (DoD) Cyber Strategy, said Rob Joyce, senior adviser for cybersecurity strategy to the Director of the National Security Agency (NSA). […]

World globe trade

The United States, Russia, and China did not sign the Paris Call for Trust and Security in Cyberspace, a global cyber pact, released Tuesday at Paris Peace Forum by French President Emmanuel Macron. […]

NSF
identity management-min

A new report released today from One Identity found that Federal agencies lack basic elements of cyber hygiene. The study, conducted by Dimensional Research and sponsored by identity and access management (IAM) solutions provider One Identity found that “while agency leaders recognize IAM’s importance, the majority of agencies have yet to fully adopt recommended guidelines into their cybersecurity program and some even feel their current approach distracts from agency missions.” […]

Cyber America Connected Internet of things

As Federal agencies seek to incorporate an application programming interface (API) strategy into their IT modernization initiatives, a word of caution: make sure you have API-specific security integrated into your IT infrastructure. […]

Internet of Things IoT Data Architecture diagram

The Aspen Cybersecurity Group (ACG), which was formed last year by the Aspen Institute think tank to “translate pressing cybersecurity conversations into action,” has issued several policy recommendations to bolster the security of internet of things (IoT) devices including suggesting that device manufacturers invest more in building in better security, and that manufacturers be held accountable for the security of devices that they make. […]

chip hack cybersecurity cyber

The North Korean hackers known as Lazarus Group are now stealing from ATMs to the tune of tens of millions of dollars, according to research Symantec released Thursday. […]

Categories