The NSA's top official says the highly secretive agency is looking at how much work it can do outside of a SCIF.
At a recent financial industry conference, the chairman of the Commodity Futures Trading Commission called for a shift in how organizations think about cybersecurity. She called for a change from an incident response mentality, to a resilience mentality.
Ever since the first Microsoft Word macro attack, documents have been a source of malware delivery. Thirty years later it's still a problem. Word documents, PDFs, photographs, spreadsheets, they all remain potent delivery mechanisms for hackers.
There's cybersecurity, and then there's cyberwarfare. My next guest is both an academic and a practitioner of cyber wargames. He's here to update us on the types of exercises going on right now in federal agencies.
The “AI Cyber Challenge” announced today will be a two-year effort with involvement from leading companies Anthropic, Google, Microsoft and OpenAI.
Daniel Ragsdale is joining the White House to help put the new cyber workforce and education strategy into action.
“Cross domain solutions” have long been a critical piece of securing those networks, with the technology serving as a sort of gatekeeper to keep out malware and other threats. But with agencies increasingly adopting cloud services for even classified data, the nature of the “cross-domain solutions” is evolving, too, according to John Meyer, vice president and general manager of software ventures at Arcfield.
Two of the most troublesome regimes in the world – those of North Korea and Russia – differ in many respects. But they have one thing in common, namely the use of cryptocurrencies to help finance certain activities.
Prioritizing cybersecurity from the start makes fundamental shifts like reallocating cyber roles and responsibilities manageable. The National Cybersecurity Strategy is ambitious and comprehensive, but it is critical that agencies meet these guidelines and help secure our software, data and national security.
Eric Goldstein, CISA’s executive assistant director for cybersecurity, said the agency’s first-ever cybersecurity strategic plan features three main goals and 30 measures of effectiveness.
House lawmakers are now investigating a China-linked hack that reportedly involved the unclassified email accounts of Commerce Secretary Gina Raimondo and other high-level officials.
Agencies have a key role to play in expanding the number of “good paying, middle class” cyber jobs available to a more diverse range of people.
In today's Federal Newscast: Ransomware attackers steal the personal information of more than 600,000 Medicare beneficiaries. The Defense Department now has an independent military prosecutor for the most serious offenses. And the FDIC makes plans to plug three holes in the cloud.
Agencies have made great strides under the government-wide push to adopt zero trust security principles. But the latest challenge giving many CISOs a headache? Tagging and securing all their data.
During this exclusive webinar, top federal technology executives and industry experts will discuss what they've learned around zero trust strategy and the future of zero trust in government.