Cybersecurity

Biden nominates first assistant defense secretary for cyber policy

The position was created to address concerns about missing civilian leadership in the Pentagon’s cyber policy space.

Cybersecurity

Biden seeks 10% bump to civilian cybersecurity spending for FY25

The funding boost is influenced by the White House’s National Cyber Strategy released last year.

Cybersecurity

Government funding bill punts extension of controversial spying power

Section 702 of the Foreign Intelligence Surveillance Act expires April 19 unless reauthorized by Congress, and an 11th-hour funding bill crafted to avert a partial government shutdown doesn't address the matter.

Cybersecurity

House advances bill empowering FTC to punish data transfers to foreign rivals

The unanimously approved legislation would give the FTC more enforcement power over data transfers to nations like China and Russia.

Policy

US sanctions Kremlin-backed firms for operating network of fake news sites

The disinformation campaign was deployed in Fall 2022, and shows how Russia’s private sector easily works with the government on disinformation operations.

Cybersecurity

White House warns states of continued cyber threats to water infrastructure

The letter to state governors comes after the U.S. sanctioned Iran-linked hackers in February for their breach of water treatment systems last year.

Cybersecurity

Ransomware payment debate resurfaces amid Change Healthcare incident

Expert views don’t entirely align on whether victims should pay ransomware hackers.

Cybersecurity

U.S. still finding victims of advanced China-linked hacking campaign, NSA official says

The Volt Typhoon hacking collective, backed by the Chinese People’s Liberation Army, has been working to burrow into sensitive U.S. systems, officials previously said.

Cybersecurity

FCC approves cyber labeling program for IoT devices

The move is one of several directives underpinning a sweeping Biden administration plan to shore up U.S. cybersecurity.

Cybersecurity

CISA rolls out secure software attestation form

A repository for software attestation submissions will be available later in March.

Exclusive People

Ex-NSA innovation chief’s new startup looks to future-proof federal agencies against cyberthreats

Kevin Keaton’s Eyris would fuse blockchain technologies into advanced security solutions to defend federal agencies, the Pentagon and others against cyber threats.

Cybersecurity

China, Russia and Iran capable of disrupting 2024 elections, intel assessment warns

Three nations have the means of deploying campaigns attempting to scramble election outcomes in November, according to the intelligence community’s annual worldwide threat assessment.

Cybersecurity

CISA targeted through Ivanti VPN vulnerabilities, reports say

The DHS agency has been issuing warnings about Ivanti products since at least 2020.

People

Exit interview: Mitch Herckis

In an exclusive interview, the former branch director for federal cybersecurity in the White House Office of the Federal CIO, discussed challenges, White House cyber priorities and his office’s efforts to integrate zero trust into the federal government.

Digital Government

New bill aims to bring SNAP card security up to credit card standards

Security standards for SNAP cards have not kept pace with industry advancements, lawmakers say.

Exclusive Cybersecurity

Flaws in public records management tool could let hackers nab sensitive data linked to requests

The GovQA platform, created by IT company Granicus, contained vulnerabilities that could have let cybercriminals retrieve tranches of sensitive files tied to public records requests, a security researcher revealed to Nextgov/FCW.

Cybersecurity

Government facilities were third largest ransomware target in 2023, FBI says

The FBI’s IC3 findings also show government official impersonation scams are on the rise.

Cybersecurity

House panel to weigh bill barring data brokers from making transfers to foreign rivals

The measure, backed by the House Energy and Commerce Committee’s leaders, considers similar data types listed in a recently signed data security executive order.