Latest ""
Making the NIST Cybersecurity Framework 2.0 work for you
The NIST Cybersecurity Framework represents an excellent starting point to taking a proactive cybersecurity approach.
By Shunta Sharod Sanders
Opinion
The troubling kaleidoscope of 2024 election security
Election systems, crucial to our democracy, face escalating threats from nefarious cyber tools and tactics like phishing, malware, and ransomware.
By Tom Guarente
Opinion
How Unified Attack Surface Management future proofs fed cyberspace
The threat landscape has evolved far beyond the capability of traditional perimeter-based cyber defenses to contain.
By Kunal Modasiya
Opinion
Know your customer – as long as it’s not China
A proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies.
By Paul Rosenzweig
Is telework a ‘reasonable accommodation’ for pregnant federal workers?
The EEOC regulation also stipulates accommodations for workers seeking abortions or infertility treatments.
Opinion
Congress should address recurring cases of cyber espionage at home
It should be focusing on improving the cybersecurity practices of the domestic actors who repeatedly allow this foreign hacking to occur.
By Reynold Schweickhardt
Deported veterans struggle to access VA services, study finds
Historically, policies involving the deportation of veterans have not always been closely followed.
By Zamone Perez
Opinion
How to boost customer experience with secure cross-agency data sharing
The Federal Data Strategy directs agencies to assess and proactively address the procedural, regulatory, legal and cultural barriers to sharing data.
By Evan Davis
Opinion
Why Volt Typhoon chose routers to target critical US infrastructure
Routers are targeted because they can connect networks to the internet, as well as connecting and controlling traffic across internal networks.
By Phil Lewis
Microsoft ripped over shoddy security in Chinese hack of feds
The hack was initially disclosed in July by Microsoft in a blog post and carried out by a group the company calls Storm-0558.
Opinion
Adding to regulatory burdens doesn’t necessarily improve cybersecurity
Pursuing such policies may actually reduce national security by diverting resources from legitimate activities to secure networks and systems.
By Liselotte Odgaard and Roslyn Layton