To execute their second-half blitz, federal managers must pore through mountains of data across thousands of programs. The threat landscape has evolved far beyond the capability of traditional perimeter-based cyber defenses to contain. By Kunal Modasiya
12 days ago A proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies. By Paul Rosenzweig
13 days ago At Archives II in Maryland, paper stacks are not something to be feared, but to be revered. It should be focusing on improving the cybersecurity practices of the domestic actors who repeatedly allow this foreign hacking to occur. By Reynold Schweickhardt
2 weeks ago The Federal Data Strategy directs agencies to assess and proactively address the procedural, regulatory, legal and cultural barriers to sharing data. The Pentagon and State Department will make it easier for military spouses to take federal civilian jobs overseas following a permanent change of station. Every April, Tax Day comes around as the official filing deadline for Americans to submit income tax returns to the federal government. Routers are targeted because they can connect networks to the internet, as well as connecting and controlling traffic across internal networks. The hack was initially disclosed in July by Microsoft in a blog post and carried out by a group the company calls Storm-0558. Load More