Sponsored Resource

  • Biometrics
    facial recognition technology (Shutterstock.com)

    CBP isn't alerting air travelers to biometrics collection, watchdog says

    Customs and Border Protection's facial recognition program that collects photos of air travelers is hitting its performance targets according to a Government Accountability Office audit, but passengers aren't seeing privacy information and opt-out signage. 09/02/2020

  • Cybersecurity
    malware

    CISA, White House release vulnerability disclosure policies

    The Office of Management and Budget and the Cybersecurity and Infrastructure Security Agency have released a memorandum and Binding Operational Directive guiding federal agencies on how to set up their vulnerability research and disclosure programs. 09/02/2020

  • Cybersecurity
    code scan (Titima Ongkantong/Shutterstock.com)

    CISA bug bounty directive awaits White House blessing

    A draft policy from the Cybersecurity and Information Security Agency instructing agencies to create vulnerability disclosure programs to allow third-party bug hunters to flag security vulnerabilities in federal systems is all-but-completed, sources say. 09/01/2020

  • Comment
    mobile security (Production Perig/Shutterstock.com)

    Cybersecurity in the telework age

    Each mission environment has distinct needs and resources that don’t always fit into a “one-size-fits-all” solution. 08/28/2020

  • Election Security
    open source election technology

    Experts tout election security gains since 2016

    While threats to election infrastructure endure, experts are telling the public not to lose sight of the many security gains that have been put in place over the last four years. 08/28/2020

  • Cybersecurity
    open lock (ESB Professional/Shutterstock.com)

    NASA doesn't know what's on its network

    According to an oversight report, the space agency can't provide an accurate count of the number of contractor-owned devices connected to its networks. 08/27/2020

  • Acquisition
    BY By julia.m Royalty-free stock vector ID: 779956477

    The risks of supply chain threat sharing

    Some of the most valuable data around supply chain threats – identifying suspicious or untrustworthy actors -- can often be legally perilous to share. 08/27/2020

  • Cybersecurity
    threat hunting (alphaspirit/Shutterstock.com)

    Disinformation on the cheap

    Online influence operations are often easy and cheap to set up with open source tooling, according to new research from Cisco Talos. 08/26/2020

  • Cybersecurity
    Paul Nakasone confirmation hearing for NSA

    Cyber Command takes the fight abroad

    The head of U.S. Cyber Command defends "persistent engagement" strategy with adversaries, explaining that proactive cyber operations won't lead the U.S. into an "all out war." 08/25/2020

  • Defense
    lock on a chip (shutterstock.com image)

    DARPA's new hardware proves tough to crack

    The Defense Department's advanced research arm has early results from its effort to prove that re-engineering hardware makes for fewer cyber vulnerabilities. 08/24/2020

  • Comment
    zero trust network

    How zero trust solves the 'weakest link' problem

    Many government agencies currently have components of zero trust already in their infrastructure, including identity credential and access management and continuous monitoring, so moving to a comprehensive zero trust model would just strengthen what is already there. 08/24/2020

  • Cybersecurity
    application security  (Ditty_about_summer/Shutterstock.com)

    Voice phishing attacks on the rise, CISA, FBI warn

    An industry alert warns of an increasingly sophisticated social engineering campaign since July that is targeting VPNs and teleworkers. 08/21/2020

  • People
    DHS assistant director for infrastructure protection Brian Harrell, testify during a House hearing titled, "Confronting the Rise in Anti-Semitic Domestic Terrorism," Feb. 26, 2020.

    CISA infrastructure chief Brian Harrell resigns

    The assistant director, charged with helping to protect critical infrastructure from physical and cyber threats, will be returning to the private sector, the agency confirmed. 08/20/2020

  • People
    Federal CISO Grant Schneider

    CISO Schneider exits OMB for Venable post

    Federal Chief Information Security Officer Grant Schneider is leaving the federal government to take a job at Venable. 08/18/2020

  • Cybersecurity
    security breach (Song_about_summer/Shutterstock.com)

    Senate's latest Russia report backs new rules for cyber vendors

    Federal investigators may need new authorities to probe cybersecurity breaches in sensitive non-governmental networks, according to the declassified version of the Senate Select Committee on Intelligence's report on foreign interference in the 2016 election. 08/18/2020

Stay Connected

Opinion that Matters

  • Comment
    cloud-enabled telework

    How a telework bill can boost security, modernization

    The bipartisan Pandemic Federal Telework Act would make technology and security an integral part of telework planning and data reporting. 10/16/2020

  • Comment
    automated security (Alexander Supertramp/Shutterstock.com)

    A future-proof security model for a modern, mobile government

    COVID-19 has shown the importance of the extensibility and scalability of the cloud and has been a forcing factor, expediting modernization initiatives – including security modernization. 10/05/2020

  • Comment
    Information sharing

    How to shift CMMC for the future

    While the goal of Cybersecurity Maturity Model Certification is to establish a unified standard for cybersecurity practices across the DOD, it does not directly address specific control expectations or risks associated with organization-specific threat actors. 09/28/2020