Federal agencies are inoculating public IT infrastructure by not only listening to the Internet’s Immune System, but proactively inviting healthy input. By Casey Ellis
10 days ago The judge noted that the 49-year-old Costanzo was “especially culpable” as a supervisor because he “knew what he was doing was wrong.” Election systems, crucial to our democracy, face escalating threats from nefarious cyber tools and tactics like phishing, malware, and ransomware. By Tom Guarente
11 days ago The rule, which doesn’t apply to workers at non-profits, is to take effect in four months unless it is blocked by legal challenges. If the high court sides with Starbucks, it could make it tougher for the agency to step in when it alleges corporate interference in unionization efforts. By Dee-Ann Durbin
12 days ago To execute their second-half blitz, federal managers must pore through mountains of data across thousands of programs. By Mark Fedeli
13 days ago The threat landscape has evolved far beyond the capability of traditional perimeter-based cyber defenses to contain. By Kunal Modasiya
2 weeks ago A proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies. By Paul Rosenzweig
2 weeks ago At Archives II in Maryland, paper stacks are not something to be feared, but to be revered. It should be focusing on improving the cybersecurity practices of the domestic actors who repeatedly allow this foreign hacking to occur. By Reynold Schweickhardt
3 weeks ago Load More