Ideas
The Federal Government is Using 20th-Century Responses to a 21st-Century Problem
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do the same for its digital assets.
Ideas
5 Steps to Protecting Federal Data Repositories in the Cloud
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information.
Cybersecurity
Lawmaker to Propose Bill to Incentivize Industry Cybersecurity Cooperation Within Days
During congressional testimony, cybersecurity firm FireEye pushed for greater liability protections to be included in a draft cyber incident reporting bill.
Cybersecurity
OMB Provides Tiered Instructions on Logging Requirements in Executive Order
A memo for agencies assigns criticality levels to monitoring activities along various categories and sets deadlines for compliance.
Cybersecurity
Expired Driver’s Licenses Open Lane for Cybercriminals
Fraudsters send out texts or emails falsely warning that the target’s license needs to be updated, is missing information or is expiring.
Cybersecurity
Lawmakers Call for Check on Software Acquisition Requirements in Defense Bill
Language from the House Armed Services’ cybersecurity subcommittee also proposes testing for non-kinetic attacks, and the creation of an inventory toward ending the use of legacy systems.
Cybersecurity
CISA Encourages Mitigations in Face of OnePercent Group
The Cybersecurity and Infrastructure Security Agency shared an FBI flash report on the group which provides insight into the extent of the ransomware business ecosystem.
Ideas
5 Items to Monitor to Detect DDoS Attacks
Government organizations have been a steady target of distributed denial-of-service attacks.
Cybersecurity
Facing Foreign Election Foes, States Hire ‘Cyber Navigators’
Local election officials are on the front lines of election defense, but they often are underfunded or lack the technical knowhow to protect systems from cyber threats.
Cybersecurity
White House Tasks NIST with Producing Another Cybersecurity Framework
The administration touted private-sector commitments to improve cybersecurity through training and design.
Cybersecurity
DHS Launching First Federal Civilian Position Exempt from Longevity Requirements
The Cyber Talent Management System has been in the works since a 2014 law granted the department authorities to sidestep rigid classification formats such as the General Schedule.
Cybersecurity
White House Announcements to Focus on Advancing Cybersecurity Talent
Commitments are also expected from the public and private sectors for improving the security of foundational technology.
Ideas
Developing a Holistic Approach to Multicloud Security
To be effective, a multicloud security strategy needs to provide end-to-end protection that gives agencies visibility across hosts and services.
Cybersecurity
U.S. Expands Cybersecurity Collaboration with Singapore
The move comes as China has become more assertive in the region.
Cybersecurity
Hackers Strike Another Hospital System
Cybercriminals struck Memorial Health System, a nonprofit that runs three hospitals, outpatient service sites and clinics spread across southeastern Ohio and northwestern West Virginia.
Cybersecurity
IG: 5 Things USAID Needs to Do to Better Protect Personally Identifiable Information
A recent audit showed gaps remain in the agency’s policies despite progress over the last seven years.
Cybersecurity
FDIC’s Temporary Wi-Fi Network Tool Doesn’t Have Needed Security Authorizations
The program is in limbo while the tool awaits an ATO, prompting the inspector general’s office to express its “concerns.”
Cybersecurity
States Snag $240M to Combat Unemployment Fraud
The federal grant funding can be used to pay for identity verification services, cybersecurity, or other expenses related to fraud detection.
Cybersecurity
Homeland Security Considering CMMC-like Compliance Effort
The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.
Ideas
Dissecting FedRAMP for Containerized Applications
Five essential things federal programs need to know.
Almost There!
Help us tailor content specifically for you: