Kaspersky Lab is willing to turn over its source code to the U.S. government to dispel rumors that the company has ties to the Russian Kremlin, CEO Eugene Kaspersky told the Associated Press on July 1. “If the United States needs, we can disclose the source code,” Kaspersky said. “Anything I can do to prove that we don’t behave maliciously, I will do it.” […]

voting election map united states federal country government

Some states refused to turn over voter data to the White House on June 30, saying that the data requested contains sensitive information and could be used for political purposes. President Donald Trump signed an executive order in May that established the Commission on Election Integrity, which investigates instances of potential voter fraud. The commission asked the states to turn over all publicly available voter data.






[…]

Reps. Anna Eshoo, D-Calif., and Susan Brooks, R-Ind., and Sens. Orrin Hatch, R-Utah, and Ed Markey, D-Mass., introduced legislation June 29 to combat cyber crime by mandating that the National Institute of Standards and Technology, the Federal Trade Commission, and the department of Homeland Security (DHS) establish baseline best practices for the private sector.






[…]

The cyberattack that spread across Europe on June 27 was declared not a ransomware attack after further observation by researchers. The “Not Petya” attack didn’t encrypt files on the infected computers. Instead, it wiped the entire drive, making it impossible to retrieve files if they weren’t backed up on another device.






[…]

The transparent reporting of spending data through Digital Accountability and Transparency Act (DATA) requirements will go a long way to increasing public trust in the government, according to legislators and agency officials who spoke at the DATA Summit on June 29.






[…]

The United States and Israel announced plans June 27 to cooperate on cybersecurity issues, including domestic and international cyber policy, critical infrastructure protection, research and development, and workforce development.






[…]

Barracuda Networks announced the release of Barracuda Sentinel, an artificial intelligence-based solution to the increasingly targeted spear phishing campaigns experienced by all sizes of government and industry.






[…]

Companies that paid the ransom to retrieve their data from the Petya ransomware attack have no way of receiving the encryption key. Although Symantec has verified the Ukrainian accounting service, MeDoc, as “patient zero” for the attack, the cybersecurity company hasn’t discovered who is behind the attack. The email account that the attack stemmed from has been shut down, so that companies that pay the ransom of $300 won’t receive the encryption key needed to return their data.






[…]

Technological innovation has a very low chance of creating the mass job displacement predicted by many experts, according to research recently released by the Information Technology and Innovation Foundation (ITIF).






[…]

As agencies navigate cloud, they continue to leverage and build upon lessons learned. And, it seems to be working: According to a recent MeriTalk study, 75% of Federal cloud decision-makers say their workforce is somewhat or very comfortable with moving its systems to the cloud.

But, how did they get there and what’s really the first step of a successful migration? Knowing your IT environment is important – but even more essential is ensuring you have a cloud-ready workforce.






[…]

Bernard Barton, chief information officer of the Library of Congress, is challenging American coders to bring the centuries-old information stored by the library into the digital era. The challenge, which will launch later this year, asks coders to submit ideas for modernizing the public’s access to the Library of Congress’ data.






[…]

Another cyberattack with links to the stolen cache of National Security Agency materials is spreading across Europe on June 27, targeting banks, businesses, and a Ukraine power company. Infections have been reported in Russia, Ukraine, Spain, France, the United Kingdom, and India.






[…]

The number of reported Internet crimes and the costs incurred by those crimes are on the rise, according to the FBI Internet Crime Complaint Center’s recently released 2016 Internet Threat Report. The “hottest” Internet crimes of 2016 were business email compromise, ransomware, tech support fraud, and extortion.






[…]

Cloud computing services can keep pace with the fast-moving nature of private sector workplaces, according to Conrad Unciano, systems engineering manager for CSRA. He said CSRA recently migrated four of its key applications using Amazon cloud services.






[…]

Both members of the private sector and state governments are struggling under the burden of inconsistent and overlapping Federal cybersecurity regulations, according to experts who spoke before the Senate Homeland Security and Government Affairs Committee.






[…]

Strategy in cyberspace should be treated like the strategy used in traditional military battle spaces, according to Ray Letteer, chief of the cyber division of the Command, Control, Communications, and Computers (C4) Department at Headquarters of the U.S. Marine Corps, who spoke at Tenable’s GovProtect17 on June 21.






[…]

Categories