American University professor Bob Tobias talks about the problems with putting political appointees in charge of cybersecurity at federal agencies
The “5G Security Evaluation” was developed by a joint study team led by the Department of Homeland Security and the Department of Defense.
Marina Tovar, counterintelligence and cyber team lead at the Counterterrorism Group, joins host Derrick Dortch to discuss how cyberwarfare is being used in the war in Ukraine, and the rise in ransomware attacks around the world.
The civilian and Defense sides of the government have taken a big step together to move the Defense Department's innovative, nontraditional contractors to the mainstream of federal contracting.
More and more, the Defense Department's weapons systems must be cyber resilient. Now there's a publicly available webinar for science and engineering people that outlines what DOD calls its Cyber Resilient Weapon Systems Body of Knowledge.
For one view of what this means for technology and the investments needed to support the new work mode, the Federal Drive with Tom Temin turned to the president of HP Federal Todd Gustafson.
By any measure software vendor Solar Winds was a high flyer, with many federal customers for its IT managements software. Now the company says it's nearly recovered from the 2020 Sunburst hack that sent federal agencies fleeing...and became part of the cybersecurity vernacular.
The Cybersecurity and Infrastructure Security Agency issued a new emergency directive today saying the vulnerabilities in some VMware products put federal networks and systems at immediate risk.
Lawmakers are skeptical about progress on multifactor authentication, endpoint detection and other capabilities mandated by the cybersecurity executive order.
Malicious actors have found that they can manipulate these digitized systems with the possibility of damaging water infrastructure or even changing the way it’s treated to introduce harmful chemicals.
Former officials call the Energy Department’s decision not to name a political appointee to lead its Office of Cybersecurity, Energy Security and Emergency Response (CESER) a mistake.
As part of the Cybersecurity Maturity Model Certification exercise, DoD will figure out which data under Level 2 will require self-assessments and which will require third-party assessments.
Not everyone feels comfortable driving a Hummer for their morning commute, and most people don’t have to wear combat boots to work. But when it comes to the hardware, software and platforms that keep business safe, shouldn’t companies have the same caliber tools and products that the nation’s most elite cyber teams have?
Hackers spent a year probing companies' networks for weaknesses.
Almost everything is connected to the internet which will expand the number of attack surfaces.