Some policyholders said that they couldn’t access certain account statements. The hack was initially disclosed in July by Microsoft in a blog post and carried out by a group the company calls Storm-0558. At the outset, there’s a need to blend legacy standards and practices with modern components to ensure all systems can communicate effectively. By Lee Koepping
6 weeks ago There are more than 570,000 open cybersecurity jobs in the U.S. alone – with open positions increasing by 35% in the last year. By Dan Wilbricht
8 weeks ago The security and protection of OSS are of the utmost importance as we move forward with the OS3I initiative. By Joel Krooswyk
8 weeks ago One FAR cyber threat reporting rule may impact up to 94,000 government contractors at a cost of more than $1.5 billion each year. By Scott C. Algeier
2 months ago Russian state media and online accounts tied to the Kremlin have spread misleading and incendiary content about U.S. immigration and border security. By David Klepper
2 months ago Air-gapped, immutable backups with isolated recovery allow agencies to keep operations running even when primary systems are compromised. By Travis Rosiek
2 months ago Public sector leaders need to ensure their IT teams have the tools and insights required to optimize application availability, performance and security. By Gregg Ostrowski
2 months ago Hostile activity in cyberspace — from spying to the use of malware that disrupts infrastructure — has become a hallmark of modern geopolitical rivalry. Load More