Cybersecurity

Working Group Breaks Down the Keys to Securing Mobile Devices

The Federal Mobility Group’s new guidance includes four strategic pillars that form the foundations of mobile security.

Artificial Intelligence

Experts Call for a U.S. National Technology Strategy as Competition Heats Up with China

There’s much to be considered as ‘what could be one of the most disruptive periods in human history’ approaches.

Cybersecurity

Russian Corruption Makes It Harder to Crack Down on Ransomware

Hackers who learned skills in government service are branching out “for their own personal enrichment,” Pentagon cyber leader says.

Cybersecurity

5 Ways to Keep Vaccine 'Cold Chain' Safe from Hackers

Health systems can prevent outsiders from tampering with the equipment that keeps vaccines ultra cold.

Cybersecurity

New missions could present challenges for the DOD cyber workforce

Mieke Eoyang, the deputy assistant secretary of defense for cyber policy said one of DOD's main cyber workforce challenges is being able to set expectations around policymakers' calls to step in and defend against cyberattacks.

Cybersecurity

Justice Official Dangles Liability Protections to Encourage Private-Sector Breach Reports

Deputy Attorney General Lisa Monaco also promised to compensate whistleblowers who reveal federal contractors misrepresenting their cybersecurity posture.

Digital Government

GSA Wants a Real Person Associated With Every SAM Registration Before Fiscal Year’s End

Every organization doing business with the government will have to name a real person as account administrator and go through a three-point ID proofing process.

Cybersecurity

National Cyber Director: Liability Should Be Part of the Equation for Public-Private Collaboration

Cyber leaders’ plan to emphasize collective defense over offense hinges on industry’s willingness to share information with government in real time.

Ideas

Operational Technology in the Crosshairs

Yes, utilities use both IT and OT, but so do data centers.

Cybersecurity

CISA seeks 24-hour timeline for cyber incident reporting

Two separate Senate bills set different deadlines for federal contractors, critical infrastructure providers and other covered companies to report cyber incidents to the federal government.

Cybersecurity

Feds Urge Action Against BlackMatter Ransomware Based on Third-Party Tip

A joint advisory officially associates the notorious ransomware-as-a-service group with the Colonial Pipeline attack.

Cybersecurity

CISA Seeking Answers for Implementation of Endpoint Detection and Response Tools

The agency has an idea of what it wants from the capability but is soliciting industry input on key aspects of an enduring investment plan.

Ideas

Federal Health Care Organizations Seek New Prescription for Managing Device Vulnerability 

The threat landscape in the medical sector is massive and expanding daily with exponential growth in connected medical devices.

Cybersecurity

Treasury Analysis Identifies Cryptocurrency Exchanges Associated With Ransomware

The department is tracking a huge increase in ransomware disclosures but data suggests the events are still grossly underreported.

Digital Government

DDS Security Clearance Tool Evolves into ‘SITH’ Insider Threat Program

The Defense Digital Service’s automated investigations tool turns to the dark side of insider threat hunting and gets rebranded to match.

Cybersecurity

Agencies Warn of Ongoing Cyber Threats to Water Treatment Facilities

The Cybersecurity and Infrastructure Security Agency and other agencies issued a joint advisory about mitigating ransomware threats.

Cybersecurity

Health Agency CISO Looks to Increase Security in Software Transparency Requirements

Robert Wood aims to improve security while fostering faster mission execution from a DevSecOps “BatCAVE” at the Centers for Medicare and Medicaid Services.

Cybersecurity

The CISO reporting structure is broken

The commitment to managing cyber risk is a primary concern, but is often consolidated with IT priorities. This creates a conflict – does IT or security come out on top?