What Capital One's cybersecurity team did (and did not) get right
It's not great that a lone engineer was able to pull data from 106 million people. But this was far from Equifax 2.0.
CBP suspends Perceptics from doing government business following data breach
The punishment could last for years if Perceptics is placed on a government blacklist.
Customs and Border Protection subcontractor hack exposes traveler photos, license plates
The hackers struck after the unnamed subcontractor transferred copies of the images collected by CBP to the subcontractor’s network.
Passport numbers stolen from Marriott provide scammers with another ID theft tool
It's another piece of data that can be used to sell "fullz," or full stolen profiles used to commit identity theft.
DHS drone data left vulnerable, audit finds
While the Department of Homeland Security has looked to step up its use of drones to patrol the southern border, lax security policies have left the collected data vulnerable, a new audit finds.
FBI pushes private sector to cut ties with Kaspersky
Amid calls to remove the company out of the government, the FBI has been telling private sector companies that Kaspersky is an unacceptable threat to national security.
Top Women in Cybersecurity: Jeanette Hanna-Ruiz
There's no organization in the universe quite like NASA. Jeanette Hanna-Ruiz is the chief information security officer at the agency.
New CISO takes lead at Customs and Border Protection
U.S. Customs and Border Protection has hired Alma Cole, a former CBP IT security specialist, as its Chief Information Security Officer.
DHS: Georgia incident was legitimate work, not a hack
The Department of Homeland Security told Georgia’s Office of Secretary of State that the IP address associated with an attempted breach of the state office’s firewall was tracked an office in U.S. Customs and Border Protection.
White House cyber plan sets tough deadlines
The White House’s Office of Management and Budget released its long-awaited Cybersecurity Implementation Plan Friday, charting out a series of actions and timelines for federal agencies to follow in order to greatly improve the protection of federal data and networks.