policy and data, weapon systems, zero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB
Getty Images/iStockphoto/NicoElNino
Cybersecurity

Why Defense contractors still have a cyber target on their backs

FILE - This Oct. 14, 2015, file photo shows the Food and Drug Administration campus in Silver Spring, Md. On Tuesday, April 17, 2018, U.S. health officials proposed steps to improve the government’s system for overseeing medical devices, which has been subject to years of criticism for failing to catch problems with risky implants and medical instruments. (AP Photo/Andrew Harnik, File)
Cybersecurity

Medical devices are the soft cybersecurity underbelly for health care providers

counter terrosim logo
Fed Access

Cyber warfare in Ukraine

A joint cybersecurity advisory released by the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the National Security Agency and the FBI is photographed in Washington, Wednesday, April 13, 2022. The agencies issued the joint alert Wednesday announcing the discovery of malicious cyber tools capable of gaining "full system access" to multiple industrial control systems. (AP Photo/Jon Elswick)
Commentary

Connected federal buildings could become prime cyber targets

Kelly Mack
Federal Newscast

Some members of the Interior Dept. will have an opportunity for remote work

FILE - In this May 6, 2020, file photo, a sign stands outside the Department of Labor's headquarters in Washington. A government watchdog has found that the Labor Department’s widely watched weekly unemployment benefits data are providing an inaccurate reading on the number of newly laid off workers because of flaws in the government’s data collection. (AP Photo/Patrick Semansky, File)
(AP Photo/Patrick Semansky)
Cybersecurity

Think you understand phishing attacks? Wait 'til you hear this

090310-D-5972N-009
SAN DIEGO, Calif. (March 10, 2009) Information Systems Technician 2nd Class Ryan Allshouse uses the intrusion detection system to monitor unclassified network activity from the automated data processing workspace aboard the aircraft carrier USS Ronald Reagan (CVN 76). IDS is part of the integrated shipboard network system and serves as an important computer network defense enabler protecting the unclassified shipboard network from cyber attack.  (U.S. Navy photo by Rick Naystatt/Released)
U.S. Navy/Rick Naystatt
Navy

How the Navy is dealing with a heightened cybersecurity threat situation

FILE - In this May 18, 2020, file photo, Transportation Security Administration officers wear protective masks at a security screening area at Seattle-Tacoma International Airport in SeaTac, Wash. The Biden administration says it is moving to increase the pay and union rights for security screeners at the nation’s airports. The Department of Homeland Security directed the acting head of the TSA to come up with a plan within 90 days to raise the pay of the screeners and expand their rights to collective bargaining.  (AP Photo/Elaine Thompson, File)
(AP Photo/Elaine Thompson)
Federal Newscast

Exposed to COVID-19 on the job? New website lets you join class-action lawsuit for hazard pay

Ukrainian Army soldiers prepare to tow a damaged military truck in Kyiv, Ukraine, Friday, Feb. 25, 2022. Russia is pressing its invasion of Ukraine to the outskirts of the capital after unleashing airstrikes on cities and military bases and sending in troops and tanks from three sides. (AP Photo/Efrem Lukatsky)
Federal Newscast

Biden picks agency to lead federal response during Russia-Ukraine crisis

Cyber security IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB
Getty Images/iStockphoto/NicoElNino
Federal Newscast

CISA: Russian hackers have infiltrated defense contractors' unclassified networks

Federal News Radio pinwheel icon
Technology

Mitigating the threat of ransomware, FHFA uses all the tools at their disposal

FILE - In this Aug. 21, 2019, file photo, pamphlets are shown in the clinic of Planned Parenthood of Utah in Salt Lake City. The Biden administration on Oct. 4, 2021, reversed a ban on abortion referrals by family planning clinics, lifting a Trump-era restriction as political and legal battles over abortion grow sharper from Texas to the U.S. Supreme Court. Groups representing the clinics say they hope the rule reversal leads to the return of hundreds of service providers that left the program to protest the Trump administration's policy. HHS has estimated that the upheaval led to as many as 180,000 unintended pregnancies. The clinics provide birth control and basic health care mainly to low-income women.(AP Photo/Rick Bowmer)
Federal Newscast

Members of Congress want Pentagon to start covering birth control under TRICARE

cybersecurity
(Amelia Brust/Federal News Network)
Technology

CISA adapts to address cybersecurity threats

FILE - In this Jan. 28, 2020, file photo, a Microsoft computer is among items displayed at a Microsoft store in suburban Boston. Microsoft says the same Russia-backed hackers responsible for the 2020 SolarWinds breach continue to attack the global technology supply chain and are have been relentlessly targeting cloud service resellers and others since summer. (AP Photo/Steven Senne, File)
Federal Newscast

GAO: Agencies had trouble dealing with major cyber incidents in 2020

DISA, AI, AI/ML, Data management
Artificial Intelligence

What happens if a hacker manages to mess up an artificial intelligence algorithm

Avril Haines
Workforce

US delays intelligence center targeting foreign influence

1 2 3 9