Cybersecurity

VA Exposes Sensitive Veteran Data to Thousands of Unauthorized Employees

The files included medical records, internal communications and other sensitive information dating back to 2016, the inspector general found.

Industry Wants More Legal Cover for Sharing Supply Chain Threats

Sharing potential threats are critical for ensuring companies avoid shady vendors, but under current laws, firms that do so could wind up in court.

DISA Wants a Pentagon-Wide Identity Management System

The Enterprise Identity Service would let Pentagon officials oversee the access credentials and online activity of every user who touches its networks.

Budgetary, Technical Hurdles Continue Hampering 2020 Election Security Prep

A Congressional field hearing in Illinois highlighted how far states and local jurisdictions have come since 2016, and how far they have to go.

Texas Chief Information Officer Shares Lessons Learned from Ransomware Attack

The 23 municipalities hit in a July ransomware attack put themselves at risk by failing “to follow good cyber hygiene,” the state’s CIO said.

Putting IP Fears to Rest

The government does not need to own the intellectual property for every acquisition.

Inside the NSA's New Cybersecurity Directorate

The National Security Agency has a new state-of-the-art center and a new attitude about sharing its threat information.

CISA Official Offers Details into China-Led Attacks of U.S. Managed Service Providers

As technology advances, so do the complexities of the cyber threats targeting the nation. 

Featured eBooks

Who Wants to Hack the Army Again?

Active U.S. military, federal civilians and individuals invited by HackerOne can participate in the service’s second bug bounty.

Former Navy Secretary: Effective Cybersecurity Requires Persistent Presence

In nearly eight years as Secretary of the Navy, I faced a steep challenge on how to manage cyber threats at the pace of 8 million attempted intrusions a day in an organization of 900,000 people, Ray Mabus writes.

NIST is Hunting for Tech to Secure the Energy Sector’s Network

Officials want to help power companies bolster their digital defenses as renewable energy resources like solar panels and wind turbines introduce more vulnerabilities to the grid.

Senate Intel Committee: Russia Is Already Trying to Influence the 2020 Election

In its report, the Republican-led committee pushes back against Trump’s efforts to point fingers elsewhere.

GSA Certifies Two More Vendors Ahead of Task Order Deadline on $50B Telecom Contract 

Two more authorities to operate bring the total to five, with four more vendors waiting to get certified to get a piece of GSA’s massive Enterprise Infrastructure Solutions contract.

NSA Warns of Vulnerabilities in Multiple VPN Services

The bugs, which allow hackers to remotely download files and monitor network traffic, are already being exploited by foreign actors.

Do You Know What’s Hiding in the Cloud?

The more complex an enterprise network is, the more difficult it becomes to be certain that everything is configured correctly and adheres to regulations and guidelines.