Making the NIST Cybersecurity Framework 2.0 work for youThe NIST Cybersecurity Framework represents an excellent starting point to taking a proactive cybersecurity approach.By Shunta Sharod Sanders29 hours ago
FY25 defense budget work to ramp up after security supplemental finishDefense and veterans hearings on Capitol Hill for the week of April 30, 2024.By Leo Shane III6 days ago
OpinionKnow your customer – as long as it’s not ChinaA proposed 'Know Your Customer' rule seeks to stop adversaries from getting their hands on advanced U.S. cloud and AI technologies.By Paul Rosenzweig2 weeks ago
Senate tosses impeachment case against Homeland Security Sec. MayorkasSenators voted separately to dismiss the two articles of impeachment, arguing that they were unconstitutional.2 weeks ago
OpinionCongress should address recurring cases of cyber espionage at homeIt should be focusing on improving the cybersecurity practices of the domestic actors who repeatedly allow this foreign hacking to occur.By Reynold Schweickhardt3 weeks ago
OpinionHow to boost customer experience with secure cross-agency data sharingThe Federal Data Strategy directs agencies to assess and proactively address the procedural, regulatory, legal and cultural barriers to sharing data.By Evan Davis3 weeks ago
Defense, VA budget work begins on Capitol Hill as Congress returns Defense and veterans hearings on Capitol Hill for the week of April 8, 2024.By Leo Shane III4 weeks ago
OpinionWhy Volt Typhoon chose routers to target critical US infrastructureRouters are targeted because they can connect networks to the internet, as well as connecting and controlling traffic across internal networks.By Phil Lewis4 weeks ago
Microsoft ripped over shoddy security in Chinese hack of fedsThe hack was initially disclosed in July by Microsoft in a blog post and carried out by a group the company calls Storm-0558.4 weeks ago
OpinionAdding to regulatory burdens doesn’t necessarily improve cybersecurityPursuing such policies may actually reduce national security by diverting resources from legitimate activities to secure networks and systems.By Liselotte Odgaard and Roslyn Layton5 weeks ago
OpinionNational Cybersecurity Strategy compliance requires a modernized cloudAt the outset, there’s a need to blend legacy standards and practices with modern components to ensure all systems can communicate effectively.By Lee Koepping6 weeks ago
US Arctic ambassador nomination may freeze due to foreign actionsThe nomination for the first U.S. ambassador to the Arctic may remain frozen, despite competition in the region with China and Russia.By Jonathan Lehrfeld6 weeks ago