Modernization
Bipartisan House Bill Targets Improving Digital Identity Verification
Lawmakers aim to help confront and curb identity theft through strategic modernization.
Cybersecurity
Hackers Connected to China Have Compromised U.S. Government Systems, CISA says
Using publicly disclosed code and vulnerabilities, attackers appear to be winning a crucial race against defenders.
Cybersecurity
46,000 Veterans' Data Exposed In Financial Services Center Breach
Hackers were able to divert payments headed to private sector health care providers.
Cybersecurity
DOD Cybersecurity Certification Body Moving Forward Despite Uncertain Funding
It’s unclear where money for crucial tools such as continuous monitoring will come from.
Cybersecurity
Cyber Commission Suggests Reforms to Allow Flexible Pay, Hiring to Boost Workforce
Prospective federal employees might be turned off by cybersecurity jobs being classified as IT.
Ideas
Diving into Government’s Trusted Internet Connections Standard 3.0
The policy lays out the framework for security, but allows agencies to fill in the details based on their unique missions.
Cybersecurity
COVID Could Spur Reduced Reliance on Classified Sources of Cyber Intelligence
CISA officials highlighted cloud configuration and VPN vulnerabilities in assessing threats associated with the pandemic.
Cybersecurity
Big Tech Moves Against Certification as a Government Solution for Cybersecurity
The trade association for the industry’s largest companies recommends relying on vendor declarations.
Cybersecurity
OMB Starts Clock on Agencies Implementing Policies to Welcome Public Security Research
CISA also released a binding operational directive and will start scanning government systems for the policies when time is up in six months.
Ideas
What Agencies Need to Know About TIC 3.0 and Enabling Technology
The third version of the Trusted Internet Connection policy brings government IT closer to the capabilities available to the private sector.
Cybersecurity
CISA, International Counterparts Highlight Mistakes Organizations Make After a Cyber Intrusion
A lot of what’s necessary to appropriately respond to a cyber incident should happen way in advance.
Cybersecurity
OMB Issues Interim Rule for Banning IT Products From Federal Systems
Any individual the Federal Acquisition Security Council deems credible could initiate a removal or exclusion order.
Cybersecurity
The U.S. Has Lots to Lose and Little to Gain by Banning TikTok and WeChat
The bans threaten Americans’ freedom of speech, and may harm foreign investment in the U.S. and American companies’ ability to sell software abroad.
Cybersecurity
Pentagon’s Contractor Cybersecurity Program Approaches Testing Phase
The pending non-profit in charge of issuing certifications is moving forward with training for assessors as a key aspect of its arrangement with the Defense Department could be in flux.
Digital Government
The Tech Perspective Kamala Harris Could Bring to the Vice Presidency
Nextgov took a look at the record of Sen. Kamala Harris. D-Calif., on tech issues to see what technology perspective she could bring to the vice presidency.
Cybersecurity
Ransomware Attacks Demanding Larger Payouts from Local Governments
The average ransom demanded of a local government in a cyberattack grew from $30,000 to $380,000, according to one cybersecurity firm.
Modernization
NIST Calls for Standards to Improve Forensic Capabilities in the Cloud
The agency has been highlighting gaps in cloud standards for almost a decade now and noted a conspicuous beneficiary of the status quo.
Cybersecurity
Cyber Defenders
In this ebook, Nextgov talks to top cyber-focused officials about the programs that aim to secure federal information and networks.
Ideas
Solving the COVID Cloud Challenge
Here are five ways to secure a defense in depth strategy with a remote workforce.
Cybersecurity
Federal Agencies Warn North Korean Hackers Have Upgraded Their Cash-Out Schemes
A joint alert shared details of tactics and malware used by a state subgroup the U.S. government calls the BeagleBoyz.
Almost There!
Help us tailor content specifically for you: