Biden says US won’t supply weapons for Israel to attack RafahU.S. will still supply Iron Dome rocket interceptors and other defensive arms.By Zeke Miller, The Associated Press9 days ago
Making the NIST Cybersecurity Framework 2.0 work for youThe NIST Cybersecurity Framework represents an excellent starting point to taking a proactive cybersecurity approach.By Shunta Sharod Sanders2 weeks ago
OpinionPersistent engagement is best defense against nation-state adversariesSloppy setups, including the use of outdated encryption methods, make attacker infrastructures vulnerable to defenders looking for countermeasures.By Ian Tarasevitsch and Mike Saxton2 months ago
OpinionRemoving the Trojan Horse from America’s portsThe software embedded in Chinese-made cranes for loading and unloading cargo could possess clandestine abilities.By Jiwon Ma and Mark Montgomery2 months ago
Inside Chinese hacking company’s culture of influence, alcohol and sexHackers such as those at China's I-Soon outnumber FBI cybersecurity staff by “at least 50 to one,” FBI director Christopher Wray has said.By Dake Kang and Zen Soo2 months ago
OpinionA robust cybersecurity workforce needs more than degree requirementsThere are more than 570,000 open cybersecurity jobs in the U.S. alone – with open positions increasing by 35% in the last year.By Dan Wilbricht2 months ago
OpinionA secure-by-design approach to federal open-source softwareThe security and protection of OSS are of the utmost importance as we move forward with the OS3I initiative.By Joel Krooswyk2 months ago
OpinionConflicting government cyber mandates risk undermining US securityOne FAR cyber threat reporting rule may impact up to 94,000 government contractors at a cost of more than $1.5 billion each year.By Scott C. Algeier2 months ago
OpinionAdopting a risk management framework for federal agency cybersecurityThe federal government uses the Common Vulnerability Scoring System to rate the severity of security vulnerabilities within software.By Jonathan Trull2 months ago
OpinionThe blind spots of zero trust for federal agenciesBy establishing a comprehensive inventory of assets in IoT/OT, cryptography and cloud resources, agencies can mitigate threats posed in the environment.By Miguel Sian3 months ago
How to hold Ukraine over until Congress passes more aid fundingWashington still retains the authority to give Kyiv more than $4 billion worth of materiel from U.S. stocks.By John Hardie and Rear Adm. Mark Montgomery (ret.)3 months ago
OpinionThree steps to building an effective digital identity ecosystemPrioritizing a modern digital identity ecosystem is long overdue.By Jordan Burris3 months ago