Search results

Feds likely to miss deadline for strengthening encryption, multifactor authentication

by Tim Starks • 4 weeks ago

The May executive order was drafted as a result of the SolarWinds cyber-espionage campaign.

Seven years later, DHS set to roll out dramatic changes to system for hiring cyber pros

by Tim Starks • 1 month ago

It will change how DHS cyber personnel are paid, how they're evaluated after applying and how they're assessed for raises.

As attention grows, #ShareTheMicInCyber leaders explain why mid-career talent matters

by Tonya Riley • 2 months ago

"Getting this right is mission-critical," co-founder Lauren Zabierek explained.

Key lawmakers to CISA: Let us send you more money, power

by Tim Starks • 2 months ago

One never can be sure Congress will get its proposals across the finish line, but a pro-CISA sentiment abounds.

Pentagon office left military designs for body armor, vehicle gear open to hackers, watchdog finds

by Tonya Riley • 5 months ago

The vulnerabilities could have allowed adversaries to understand technology produced for the battlefield.

White House executive order further restricts investments in Chinese surveillance technology

by Sean Lyngaas • 6 months ago

The Biden administration is taking a similar tack to its predecessor on Chinese technology.

Biden budget seeks $750 million to respond to SolarWinds compromises, plus billions more for cyber

by Tim Starks • 6 months ago

The proposal includes $9.8 billion for federal civilian agency cybersecurity, which excludes even more cyber funding at the Defense Department.

DOD expands vulnerability disclosure program, giving hackers more approved targets

by Shannon Vavra • 7 months ago

The expansion comes as the DOD eyes broader changes for its Vulnerability Disclosure Program.

Stanford student finds glitch in ransomware payment system to save victims $27,000

by Sean Lyngaas • 8 months ago

Sometimes the good guys win.

At least 24 agencies run Pulse Secure software. How many were hacked is an open question.

by Sean Lyngaas • 8 months ago

Multiple U.S. government-funded labs conducting national security-related research appear to use the software.

TwitterFacebookLinkedInRedditGmail