Election officials seek changes to federal rule on cyberattack reportsThe proposed rule says state and local election offices must report suspected breaches within 72 hours.By Christina A. Cassidy17 months ago
OpinionNavigating fed cybersecurity: Strategies to achieve network complianceThe complexities of federal cybersecurity guidance necessitate a multifaceted approach to achieving compliance.By Matt Honea17 months ago
OpinionPersistent engagement is best defense against nation-state adversariesSloppy setups, including the use of outdated encryption methods, make attacker infrastructures vulnerable to defenders looking for countermeasures.By Ian Tarasevitsch and Mike Saxton21 months ago
OpinionRemoving the Trojan Horse from America’s portsThe software embedded in Chinese-made cranes for loading and unloading cargo could possess clandestine abilities.By Jiwon Ma and Mark Montgomery21 months ago
Inside Chinese hacking company’s culture of influence, alcohol and sexHackers such as those at China's I-Soon outnumber FBI cybersecurity staff by “at least 50 to one,” FBI director Christopher Wray has said.By Dake Kang and Zen Soo22 months ago
OpinionA robust cybersecurity workforce needs more than degree requirementsThere are more than 570,000 open cybersecurity jobs in the U.S. alone – with open positions increasing by 35% in the last year.By Dan Wilbricht22 months ago
OpinionA secure-by-design approach to federal open-source softwareThe security and protection of OSS are of the utmost importance as we move forward with the OS3I initiative.By Joel Krooswyk22 months ago
OpinionConflicting government cyber mandates risk undermining US securityOne FAR cyber threat reporting rule may impact up to 94,000 government contractors at a cost of more than $1.5 billion each year.By Scott C. Algeier22 months ago
OpinionAdopting a risk management framework for federal agency cybersecurityThe federal government uses the Common Vulnerability Scoring System to rate the severity of security vulnerabilities within software.By Jonathan Trull22 months ago
OpinionThe blind spots of zero trust for federal agenciesBy establishing a comprehensive inventory of assets in IoT/OT, cryptography and cloud resources, agencies can mitigate threats posed in the environment.By Miguel Sian22 months ago
OpinionThree steps to building an effective digital identity ecosystemPrioritizing a modern digital identity ecosystem is long overdue.By Jordan Burris22 months ago
OpinionGet ready for Cybersecurity Maturity Model Certification 2.0The basic purpose of the program is to ensure that every organization doing business with the DoD is certified with a third-party audit.By Mike Eppes22 months ago