Phishing attacks

(AP Photo/Patrick Semansky)FILE - In this May 6, 2020, file photo, a sign stands outside the Department of Labor's headquarters in Washington. A government watchdog has found that the Labor Department’s widely watched weekly unemployment benefits data are providing an inaccurate reading on the number of newly laid off workers because of flaws in the government’s data collection. (AP Photo/Patrick Semansky, File)

Think you understand phishing attacks? Wait ’til you hear this

For the anatomy of one high-end account, the Federal Drive with Tom Temin turned to cybersecurity entrepreneur and Vice President of Strategy at INKY Roger…

Read more
U.S. Navy/Rick Naystatt090310-D-5972N-009
SAN DIEGO, Calif. (March 10, 2009) Information Systems Technician 2nd Class Ryan Allshouse uses the intrusion detection system to monitor unclassified network activity from the automated data processing workspace aboard the aircraft carrier USS Ronald Reagan (CVN 76). IDS is part of the integrated shipboard network system and serves as an important computer network defense enabler protecting the unclassified shipboard network from cyber attack.  (U.S. Navy photo by Rick Naystatt/Released)

How the Navy is dealing with a heightened cybersecurity threat situation

Read more
Ohio State University sophomore Ezequiel Herrera looks up an old email about cybersecurity and phishing during an interview on campus on, Friday, March 30, 2018 in Columbus. Herrera says he has become more cautious about clicking through emails since he was caught off guard by fake phishing messages that Ohio State uses to make students and employees more alert and adept at spotting real cybersecurity threats. (AP Photo/Kantele Franko)

VA not resting on laurels after nearly tripling and securing remote workforce

Read more